4.1 Bluetooth

The Bluetooth method enables you to authenticate using any Bluetooth enabled device that is within the range. When you initiate authentication, the Advanced Authentication server searches for the enrolled Bluetooth device. If the enrolled device is within the range, you are authenticated successfully.

For example, Susanne, who is a doctor, attends many in-patients in the hospital. She accesses the computer located in each room to monitor and update the health status of the patient. In this case, Susane can specify her first-factor authentication details and use her Bluetooth enabled mobile phone to log in to the computer automatically when she is within range of a particular room. When she exits the room, she is logged out of that computer automatically.

NOTE:To use the Bluetooth method for authentication, you must install the Advanced Authentication Device Service. For more information on Device Service, see the Advanced Authentication - Device Service guide.

To authenticate using the Bluetooth method, perform the following steps:

  1. Ensure that Bluetooth is turned on in your device and is discoverable to the paired devices.

  2. The Device Service detects your bluetooth device and authenticates.

    If the paired bluetooth device is within the range, the bluetooth authentication is successful.

NOTE:If the administrator has set Enable reaction on device removal option to ON for Bluetooth method then the operating system automatically locks, if one of the following is true:

  • The Bluetooth device is disabled.

  • The Buletooth device is out of range.