Locking a Device
Devices can be locked to temporarily or permanently prevent their use without removing their configuration from the system.

This mechanism helps maintain security while allowing administrators flexibility in handling device availability.
Locking and Unlocking Devices
🔒Locking is typically used when a device is lost, compromised, or undergoing maintenance.
🔓Unlocking restores the device’s ability to authenticate and interact with the system.
🔒Locking a Device
When a Device becomes locked, that Device may not login and perform normal operations within the system.

🚧To Lock a device, please follow the steps below:
Navigate to the Security->Devices view
Locate the Device in the Devices Table by:
👀manually finding the record, or
🔍using the search field (located in the top right-hand corner of the table)

Finally, confirm that the Unlock button is present in the User's table record

🔓Unlocking a Device
When a Device becomes unlocked (i.e. active), that Device may authenticate and perform normal operation within the system.

🚧To Unlock a device, please follow the steps below:
Navigate to the Security->Devices view
Finally, confirm that the Lock button is present in the User's table record

Last updated


