Automatically locks your desktop upon removal of the USB stick

Rohos Logon Key

Rohos Logon Key

  -  17.2 MB  -  Trial
Rohos Logon Key is a two-factor authentication software that converts any USB drive into a security token for your computer and allows you to access Windows in a secure way. Works also with RFID, OTP, U2F tokens by replacing the Windows login password.

Rohos Logon Key uses NIST-approved data-security principles and encryption: the password is not stored on the authentication key in open form. USB key copy protection prevents the creation of key copies without authorization. All data on the key is encrypted with AES-256 bit key length.

Your Computer security benefits:
  • Replaces weak password-based login with a hardware Security Key: USB flash drive, Google Authenticator OTP, FIDO U2F, or industrial RFID access cards.
  • Or adds two-factor authentication: Your Key + PIN code, or Key + Windows password;
  • Uses a long and powerful Windows password, without the need to memorize it;
  • Login with an electronic Key is fully automatic and fast!
  • Authorize elevated operations in User Account Control request with a key as an easy click!
  • The computer is password-protected, but you don’t need to enter it manually each time you log in, unlock/resume or authorize changes;
  • Use a single key to log into your home, laptop and office computer;
  • Have a few different devices for login into a single PC;
  • Windows login is protected even in Safe Mode or Remote Desktop;
Employ a variety of authentication methods:
  • Any regular USB flash drive or SD card;
  • PKCS#11 security dongles like SafeNet iKey, eToken, Feitian token, etc;
  • FIDO U2F security keys
  • Google Authenticator or YubiKey  – OATH One-Time Password codes;
  • Smartphone with Rohos push authenticator or Bluetooth ID;
  • RFID access cards like MiFare 1K, Desfire, EM-Marine, Indala, HIDProx, smartcards;
  • Compatible with Windows Hello devices
Secure Active Directory authentication
  • Install a domain-wide second-factor authentication requirement;
  • Protect workstations and remote desktop;
  • Second-factor variety: OATH OTP, Security keys, different models and brands, regular flash drives, RFID industry cards;
  • Use any of One Time Password generators: Google Authenticator, SMS, by Email or physical OTP token;
  • Offline workstations support, custom 2FA notices, automated 2FA enroll by scripting, and more…
  • Cost-effective licensing: per workstation, one-time payment, free minor updates;
Note: 15 days trial version.

  • Rohos Logon Key 5.5 Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Rohos Logon Key 5.5 Screenshot 1
  • Rohos Logon Key 5.5 Screenshot 2
  • Rohos Logon Key 5.5 Screenshot 3
  • Rohos Logon Key 5.5 Screenshot 4
  • Rohos Logon Key 5.5 Screenshot 5

What's new in this version:

Rohos Logon Key 5.5
- Fixed QR-code display error for “Setup OTP” and “Setup Smartphone” login methods. Now Rohos is generating local SVG file with QR code image instead of using google API.
- Addd 2FA Key name label option when in “Setup Authentication Key” dialog. Now it is possible to assign a label name to each authentication key to distinguish among multiple keys in addition to serial UID number.


Rohos Logon Key 5.3
Improved:
- Improvements for Mifare RFID cards to support quick card swipe in some scenarios
- Improvements on Azure workstation login via RDP to correctly reuse NLA credentials in some scenarios
- Improved LDAP queries after LDAP_REFERRAL error code
- Improved 1FA login possibility by using NLA credential for Remote Desktop access when user account have 2FA methods such as Yubikey, FIDO U2F, which in some cases lead to 2FA enforcement
- Improvements for Mifare RFID Cards login method to use full-size card UID number
- Added new option for 2FA bypass control feature – “Notify any successful login (2FA/1FA)” which will create push notification for Rohos Logon Key Android/iOS app in case of any login into your Server
- Improved Emergency Login mode that now allows to use all possible login methods after a successful Questions/Answers procedure. You need to restart Windows after the Rohos Emergency Login procedure to access all possible credentials methods, such as Face Login, PIN code, etc, for normal login. These changes apply only for console based computer access.
- Improved Rohos Logon Key for Android app, new version 2.17 now has been published on Google Play Market. Added “2FA events list” and “Copy Push URL to clippboard” commands.


Rohos Logon Key 5.2
- Change log not available for this version


Rohos Logon Key 5.0
- Improvements in ‘2FA bypass control’ feature. Now the special option “Rememebr 2FA” allows defining a time interval in seconds to reduce possible false-positive alarms. Also ‘2FA bypass’ events are now added to the authentication event log with IP address information.
- Java Card support module is temporarily removed from the setup package to comply with Microsoft Defender


Rohos Logon Key 4.9
- Change log not available for this version


Rohos Logon Key 4.8
- Experimental ‘2FA bypass’ control
- Minor improvements


Rohos Logon Key 4.7
- Change log not available for this version


Rohos Logon Key 4.6
- Allows to setup and login by using different type of Authentication methods. This allows to combine 2FA devices and use a particular available device depending on use case: at home, work or remote desktop access
- Improved MFA control for “Remote Desktop users from AD user group” rule
- Fixed FIDO U2F implementation for long user names
- Improved “Smartphone” MFA method (MFA Push token) for Active Directory networks
- Added experimental support of 3rd party OTP verification protocols: added LinOTP verification URL support
- Improved password renewal support for AD networks


Rohos Logon Key 4.5
- We are glad to announce new MFA Push Tokens support to “Smartphone” authentication method available in Rohos Logon Key.  The Rohos Logon Mobile app will deliver two-factor push notifications to workstation or remote desktop server for fast and secure access. A single smartphone can keep multiple authentication records to access multiple computers.