主权项 |
1. A method comprising:
receiving an indication that a user device is within a detectable range of an enterprise device, wherein the indication that the user device is within the detectable range is received using at least one of near-field communications, radio frequency identification, or Bluetooth; identifying a user profile associated with the user device, wherein the user profile indicates an authentication challenge for access to one or more enterprise services using the enterprise device; requesting authentication information based on the authentication challenge indicated in the user profile; receiving the authentication information; verifying the authentication information; granting, to a user associated with the user device, the access to the one or more enterprise services when the authentication information has been successfully verified; receiving an indication that the user device is no longer within the detectable range of the enterprise device; and after a period of time of receiving the indication that the user device is no longer within the detectable range of the enterprise device, determining, based on a date, whether to lock the enterprise device or log the user off of the enterprise device. |