Using DRS Authentication Key

Customers are advised to back up their DRS database after they complete the configuration. Restoring the database will restore the saved DRS Authorization Key for each device. If not available, run the Uninstall command first to fully remove the client from the device and then set the configuration again as the client will accept the new DRS Authorization Key after a new install.

DRS Authentication Key

This security feature has been added to DRS where additional security between the DRS application and the device is enabled using an authentication key. This additional security check will confirm that only the initial DRS instance that was used to deploy or configure the device can be used to update the configuration of the embedded client on the device.

The DRS Authorization Key is pinned to a device or group of devices when a Full Install is performed, the DRS Authorization Key is pinned to the device the first time the device is configured within the DRS application and is kept on the device and this authentication key cannot be changed. If any DRS configuration actions, such as Sync Assets, Sync Workflow Buttons or Configure and Reboot do not contain the pinned authentication key, the request will fail and failure message will be displayed in DRS.

The DRS Authorization Key is stored in the DRS database and it is uniquely generated every time a device is added into the same used DRS application. If the same device is added to another DRS instance, then the DRS Authorization Key will be different.

If TLS is used on the device, the DRS Authorization Key pinning will not be engaged. Once the device is pinned to a given DRS instance, only that DRS instance can perform the following actions of the install and configuration options: Sync Assets, Sync Workflow Buttons and Configure and Reboot.
If TLS is disabled on the device after the initial configuration, the authentication key pinning must be reset. In order to reset the DRS Authorization Key pinning to another DRS instance, use the following actions of the install and configuration options: Uninstall and Full Install.