Rather than changing the email address on the user profile, add an alias. The change in the email address will be considered a brand-new user that must be synced, which means the user will need to scan a new Evo QR code for authentication.
If a user has issues Authenticating with EVO after an email address change, see: User cannot login after changing email – Evo Support (evosecurity.com)
Yes!
On-Prem AD: In an on-prem AD environment with users that have different username vs. email address.
Azure Ad: In AAD only environment, Evo only uses UPN (synced from AAD) and puts that in the email section in the Evo portal. Evo does not capture email from AAD so the email in AAD can be different from UPN.
This means that:
YES! Your users can use an alias in order to authenticate and log in via Secure Login, SAML, & VPN (RADIUS). Elevated Access & EVO Portal Logins do not support Alias login.
For more information, see: Custom Aliases – Evo Support (evosecurity.com)
There are a couple of ways a user can update their Evo software (The LDAP agent and/or the Evo Credential Provider):
For instructions on updating EVO software, see: How do I update Evo software? – Evo Support (evosecurity.com)
Your keys are lost to the abyss…
Actually, you can reset those for users so that they can create new ones
For more information, see: Reset Security Questions and Answers – Evo Support (evosecurity.com)
If your user type has been set as User, you will be logged into the user web portal for your organizations instance of Evo. The user web portal is limited to scanning the QR code to pair a new device with Evo and the Evo Secure Login application.
Is your favorite 3rd party app not listed as a tile? No worries! Multi-factor authentication (MFA) is possible with Evo and your SAML supported web applications. Not all options will be used, so please refer to your 3rd party web-app to see which will be needed.
You can use Evo as your Identity Provider for your Office 365 domain, however there are a few pre-requisites you must have in place as well as a few things to keep in mind:
CRITICAL THINGS TO REMEMBER
If you have 365 users/accounts that cannot have MFA enabled such as service accounts for example, it is recommended to use Microsoft’s built in MFA policies in order to exclude these users.
To start your Office 365 Integration with EVO:
Radius authentication can be used for integration with devices that don’t support SAML/SSO. To get started:
Setting up RADIUS Authentication with EVO
Prerequisite:
If you haven't done so already, please create an SSO Reset Frequency Rule. For more information, see: How do I add a rule for single sign-on (SSO) expiration? – Evo Support (evosecurity.com)
Windows Hello and PIN must be disabled on any machine that Evo Security will be installed to. We are working to find the best way to integrate Windows Hello but no ETA at this time.
Please verify this has been disabled prior to your Evo install, as this may lock the user out with no way to log back into the machine.
The Evo Credential Provider offers an option for an MFA Grace Period, basically to delay MFA. This is designed and implemented for user lock out, not user log out. Locking your screen with a grace period active will allow you to unlock that screen and not have to MFA. However, if you log out, you will need to MFA regardless.
The Grace Period takes into account the time between MFA's. If you set your MFA grace period to 5 minutes, but have been logged in (from an MFA) longer than this period, once you lock your screen, you will need to MFA again.
EVO supports hardware keys that generate a token (not biometric based), or a One-Time Password (OTP). Or more precisely, hardware keys that are either TOTP or HOTP based. For more information see: Does Evo Support Hardware Keys? – Evo Support (evosecurity.com)
Yes. If a Hardware key is attached to an EVO user, the mobile app push/notification will still work (they will both occur at the same time). However, the E-mail OTP only exists (and gets sent) if no Hardware key or Mobile device is attached to the user. Sort of like a fallback/failsafe form of MFA.
No! Have security groups set up with users in them that you wish to sync over via Active Directory (Azure or On-Premise). Ensure that the users have a unique email address. DO NOT try to sync users without an email address, or with a non-unique email address.
Not at this time. This has been added as a feature request.
If you experience issues getting users to sync from AAD to EVO, see: Azure users not syncing to Evo – Evo Support (evosecurity.com)
If you experience issues with your On-Prem AD sync to EVO, see: How do I troubleshoot issues with the Evo LDAP Agent? – Evo Support (evosecurity.com)
Yes. All users still need the basic MFA license as it is required for basic EVO functionality. The EA license is essentially an add-on that enables EA functionality.
Logging In with a shared account


For information on installing & configuring the EVO Secure Login Mobile App: Evo Secure Login mobile app
For information on using the EVO Secure Login Mobile App: How to use the Evo Secure Login mobile app