Skip to main content
Skyhigh Security

Challenge-response Protocol

The challenge-response protocol allows users whose endpoints are protected by Client Proxy software to perform restricted tasks when a business need exists.

How the challenge-response protocol works

The user and administrator can communicate by email, phone, or text messaging.

  1. The user sends the administrator a user name and email address, a business reason for the request, the policy name and revision number, and a challenge code.
  2. The administrator enters the information provided in the Help Desk interface, authenticates the user, generates a release code, then sends it to the user. The release code is also called the release key, uninstall key, or bypass key.
  3. The user enters the release code, enabling Windows uninstall of Client Proxy or suspending policy enforcement for the time period set by the administrator.
    clipboard_e3967906774d5a866bb180b34b44a4698.png
  • Was this article helpful?