How does device validation work at login?
Did you know that to protect your Doppler account, we add a security measure that allows us to validate if it is you who is trying to log in from a device that you do not usually use?
Let’s see what it is about in this article 🙂
What is this security measure about?
This functionality is intended to increase the security of your account to protect your Campaigns and Shipments. Occasionally, we add an additional layer of security for our clients’ accounts.
From now on, each user account will have an individual history of secure devices. This means that every time a user attempts to log in to Doppler, our application will detect the origin of that login and check if the device used has been previously approved as secure for that specific account.
What does this mean? Now, each account has its own history, which means that if a device is rejected by the account owner, it will only be rejected for that particular account. If the device has previously been approved as secure by the account owner, the next time you log in from that device a new confirmation will not be requested. The user will be able to access it without problems, just as she has done until now.
If a device is rejected by the account owner, this information will be recorded in our database. From then on, even if the username and password are correct, access from that specific device will not be allowed.
This will ensure an additional level of security for all of our customers’ accounts.
How does security validation work on your account?
- When trying to log in and not being validated, you will see this message. From your Email account you can follow an instruction to confirm that it is you who is trying to access and continue with your access to Doppler.
- From your Email, you will see this message. There you will have 2 options: approve the device from which you are trying to access or reject it, if it is not you and protect your account.
Additionally, your account entry may be denied because the device from which you are attempting to enter was unknown. If you need to access it from that device that was rejected, what you can do is find the email in your inbox and click the Approve button.
So now you have all the information necessary to know how to access your account, with an improved level of security that will help protect your account.
If you have any questions or queries, you can write to us at [email protected]