How can I manage my trusted devices?

You can view all trusted devices linked to your StickyAccount by logging in to the StickyAccount on our website. The implicitly displayed first tab called Dashboard contains section Trusted Devices.

Here you can see the list of trusted devices and date/time when each device was granted access. By clicking on the pencil icon next to the devices name you can rename the device. You can also disable access of the given device to your (StickyAccount) cloud account by removing it from the Trusted Devices list - click on „Remove device“ button.

Please note that the devices authorization policy depends on your authorization setting which is to be found in the StickyAccount tab called Settings - section Authorization. Available settings are:

- Authorize any device (default setting)

Any device/browser with the correct StickyAccount credentials (StickyID and Master Password) may synchronize databases and/or access your StickyAccount. No secondary authentication (next to StickyID and Master Password) is required. With this setting, removing the device from the Trusted devices list will have no influence on devices access. Access will be granted based just on StickyID and Master Password.

- One-time PIN

A PIN as a secondary authentication (next to StickyID and Master Password) is sent to your StickyID (e-mail) or Alternative e-mail (if specified) and must be entered after your StickyAccount credentials (StickyID and Master Password) have been entered. Once the PIN has been entered, the device will be added to the trusted devices list.

- No new devices

No new device (i.e. any device not included in the trusted devices list) will be allowed to connect to your StickyAccount. Even if correct credentials (StickyID and Master Password) would have been used for connection.

Because you can access your StickyAccount in different ways (e.g. direct connection from Sticky Password application on Win/iOS/Android OR web access via StickyAccount using your browser) your list of trusted devices may contain and reflect all these ways/channels. This means that you might end up with a few duplicates of one computer in the list (e.g. one direct access from the Sticky Password Windows application, one web access via StickyAccount using your FireFox browser, another web access via StickyAccount using your Chrome browser). On top of the devices name you can also use the icons and operating system logos to identify the channel/device.

Cette réponse vous a-t-elle été utile ?

Oui Non

Comment pourrions-nous améliorer notre réponse ?

Envoyer un commentaire

Merci !

Merci ! Nous ferons de notre mieux pour améliorer cette réponse.

Une erreur s'est produite. Nous nous excusons pour les inconvénients. Veuillez réessayer.

Merci. Nous venons de recevoir votre message.

Notre temps de réponse les jours ouvrés est généralement inférieur à 24 heures.
Toutefois, il arrive parfois que les volumes de trafic prolongent légèrement ce délai.

Nous avons également envoyé une copie de votre demande à