Locking a Device

Devices can be locked to temporarily or permanently prevent their use without removing their configuration from the system.

This mechanism helps maintain security while allowing administrators flexibility in handling device availability.

Locking and Unlocking Devices

  • 🔒Locking is typically used when a device is lost, compromised, or undergoing maintenance.

  • 🔓Unlocking restores the device’s ability to authenticate and interact with the system.


🔒Locking a Device

When a Device becomes locked, that Device may not login and perform normal operations within the system.

🚧To Lock a device, please follow the steps below:

1

Navigate to the Security->Devices view

2

Locate the Device in the Devices Table by:

  • 👀manually finding the record, or

  • 🔍using the search field (located in the top right-hand corner of the table)

3

If available, click the Lock button in the Actions column

Warning

After...

4

Click the Ok button.

After...

5

Finally, confirm that the Unlock button is present in the User's table record


🔓Unlocking a Device

When a Device becomes unlocked (i.e. active), that Device may authenticate and perform normal operation within the system.

🚧To Unlock a device, please follow the steps below:

1

Navigate to the Security->Devices view

2

Locate the Device in the Devices Table

Searching

You can search for a Device by:

  • 👀manually finding the record, or

  • 🔍using the search field (located in the top right-hand corner of the table)

3

Click the Unlock button in the Actions column

Warning

After...

4

Click the Ok button.

After...

5

Finally, confirm that the Lock button is present in the User's table record

Last updated