Approve or reject another agent's zero trust signature key
Agents in Admin or Super Admin role with a signature key can approve or reject other agents' requests for a key.
Every agent in a company can have their own unique signature key to perform sensitive tasks, such as remote controlling devices. This also means that it bears great responsibility to manage signature keys.
Remember:
- The first agent who creates a key does not need approval.
Remember: As best practice, it is strongly recommended that an agent in with admin or super admin role should create the first key. This is important because only users in admin or super admin roles can approve subsequent signature key requests.
- Credentials that allow you to access a device are not stored in LogMeIn Resolve. Without these credentials, potential hackers can't take over or run PowerShell commands on your remote devices.
For information on changing user roles, see Change a user's role in the admin portal
Here's how admins can approve a signature key request:
Results: The agent receives an email when the key is approved.
Note: As an admin, you can view whether users of your organization have set up zero trust keys. See View the zero trust status of users in GoTo Admin
Article last updated: 14 October, 2022
You are viewing the latest version of this article.