Solved

Multi-authentication or card reader

Posted on 2016-09-12
4
56 Views
Last Modified: 2016-10-02
We're looking for a solution for a new building where we'll be having both physical computers and VDI instances within a room and since there is no physical security in place at the moment, we'd like to see if there is anything available to first provide physical security onto rooms as well as to possibly lock the machines if no one is in the room.  Here are the specs for our opportunity:

650 users
Windows 8/10
computers include VDI instances and desktop
AD integrated
0
Comment
Question by:Jay Devon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 55

Assisted Solution

by:McKnife
McKnife earned 125 total points (awarded by participants)
ID: 41794963
To auto-lock/-unlock, there are techniques available, look at http://www.makeuseof.com/tag/lock-windows-computer-bluetooth-proximity-lock-utility/ - under the keyword "proximity", you can search for further info.
0
 
LVL 2

Assisted Solution

by:Dillyn Barber
Dillyn Barber earned 125 total points (awarded by participants)
ID: 41795297
It may be personal preference on my end, but in my opinion, Bluetooth can be hacked. When I was in the service we used common access cards with a smart chip reader (unclassified public information) which I absolutely fell in love with the security of having such. I still have a smart card reader for my laptop.

Smarts cards may have up to 8 kilobytes of RAM, 346 kilobytes of ROM, 256 kilobytes of programmable ROM, and a 16-bit microprocessor. The smart card uses a serial interface and receives its power from external sources like a card reader. The processor uses a limited instruction set for applications such as cryptography.

You can use smart cards for web and hardware authentication (doors, unlocking hard drives, authenticating in terminals, accessing certain domains and web pages).

More info can be found here: https://technet.microsoft.com/en-us/library/dd277362.aspx
0
 
LVL 64

Accepted Solution

by:
btan earned 250 total points (awarded by participants)
ID: 41795433
probably can look into contactless smartcard for physical access and machine authentication. The C1150 is available as a hybrid card with a contact chip and one or several RFID chips for physical access.
https://www.hidglobal.com/products/cards-and-credentials/crescendo/c1150
Besides it can be used as a smartcard for the WIndow login, it serves also for physical access as a RFID card
Secure solution for RFID deployments

To meet the needs of current physical access control customers, the card can be customized with the “physical access control” technologies you can choose from HID iCLASS®, iCLASS SE®, MIFARE®, MIFARE DESFire® EV1, HID or Indala® proximity, and other combinations through multi-technology Crescendo cards. The cards offer a variety of combinations of contactless technologies embedded in a single card
brochure - https://www.hidglobal.com/sites/default/files/resource_files/crescendo-smart-card-series-br-en.pdf
0
 
LVL 64

Expert Comment

by:btan
ID: 41825218
Suggested card access means and lock machine approach.
0

Featured Post

Optimum High-Definition Video Viewing and Control

The ATEN VM0404HA 4x4 4K HDMI Matrix Switch supports 4K resolutions of UHD (3840 x 2160) and DCI (4096 x 2160) with refresh rates of 30 Hz (4:4:4) and 60 Hz (4:2:0). It is ideal for applications where the routing of 4K digital signals is required.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question