Specops Key Recovery is a self-service solution for unlocking computers encrypted or managed by Symantec Endpoint Encryption. A user who is locked out at the pre-boot authentication screen can use Specops Key Recovery to unlock their computer, without calling the helpdesk. For added security, users are verified with multi-factor authentication. The solution supports a number of authentication factors, including Symantec VIP, and Mobile Code (sending a one-time code to a mobile device).
Specops Key Recovery currently supports:
- Symantec Endpoint Encryption (version 11 and higher)
- BitLocker managed by Symantec Endpoint Encryption (version 11 and higher)
Pre-boot authentication screen
When a user powers on a computer with full-disk encryption, the pre-boot authentication screen will appear. Windows will not boot up until the user has correctly confirmed their identity on this screen.
A policy contains the rules required for enrollment and multi-factor authentication when using Specops Key Recovery. A policy controls what identity services can be used, and how many must be used to verify the identity of end-users. The system administrator is responsible for configuring the rules in the policy.
Multi-factor authentication requires more than one method of authentication from independent categories of credentials : something you know (i.e. password), something you have (i.e. Mobile device), and something you are (i.e. Fingerprint).
The Specops multi-factor authentication model is dynamic. Users can choose which identity services they want to combine for enrollment and authentication, as long as they meet the requirements of the policy.
Identity services enable users to securely identify themselves when signing in. Identity services fall into multiple categories, including: Active Directory username and password, social (Facebook, LinkedIn, Tumblr), and higher trust (Google Authenticator, Microsoft Authenticator, Duo Security).
The following identity services can be used to authenticate users in Specops Key Recovery:
Architecture and Design
Specops Key Recovery is a component of the Specops Cloud. Specops Authentication, another component of the Specops Cloud, is used to authenticate to Specops Key Recovery. Authentication rules for accessing Specops Key Recovery can be defined on the Admin pages in the Specops Cloud.
To read user information from Active Directory, the Specops Cloud communicates with the Gatekeeper. The Gatekeeper is installed on a server in your domain. The Gatekeeper reads user information from Active Directory, and manages all operations against Active Directory, such as reading/writing enrollment data.
- The user forgets their password, and is locked out at the pre-boot authentication screen. The screen prompts the user to visit Specops Key Recovery on a mobile device.
- Specops Key Recovery (keyrecovery.specopssoft.com) redirects the user to Specops Authentication.
- Specops Authentication asks the Gatekeeper for the Group Policy Object that affects the user, and obtains the authentication rules to grant access to Specops Key Recovery. The authentication rules are displayed for the user. The user authenticates with various identity services to fulfill the policy, after which, the user is returned to Specops Key Recovery.
- Specops Key Recovery asks the Gatekeeper for a list of the user’s devices.
- The Gatekeeper asks Symantec Endpoint Encryption for the user’s devices, and a list is returned. The user’s computers are displayed on the key recovery page (keyrecovery.specopssoft.com).
- The user selects their locked computer from the list in Specops Key Recovery, and the browser is redirected to the recovery page.
- The user enters a sequence number on their mobile device and presses Continue. A key-pair is generated and the public key is sent with the sequence number to the Gatekeeper.
- The Gatekeeper asks Symantec Endpoint Encryption for a Recovery Key, based on the information the user has provided.
- Specops Key Recovery displays the Recovery Key to the user and instructs them to enter information on their locked computer.
- The user enters the Recovery Key on their locked computer. The computer then is unlocked.