- Home
- IAM
- Multi-Factor Authentication and Single Sign-On
- Rublon Remembered Devices
Rublon Remembered Devices
MFA bypass policy for trusted devices with configurable time limits.

Rublon Remembered Devices
MFA bypass policy for trusted devices with configurable time limits.
Go Beyond the Directory. Track the Entire Market.
Monitor competitor funding, hiring signals, product launches, and market movements across the whole industry.
Rublon Remembered Devices Description
Rublon Remembered Devices is a policy feature within the Rublon Admin Console that allows users to bypass Multi-Factor Authentication (MFA) on trusted devices for a configurable period of time. When a user successfully authenticates via MFA, they are presented with a "Remember this device" checkbox. If selected, Rublon stores the device recognition, allowing the user to skip MFA on subsequent logins from that device until the configured time period expires. Administrators can configure the duration for which devices are remembered, ranging from 1 hour to 90 days. The feature is managed through custom policies in the Rublon Admin Console, which can be assigned selectively to specific applications. This allows organizations to apply Remembered Devices only to lower-risk applications while keeping MFA enforced for high-risk or critical applications. Once the configured time window expires, users are required to complete MFA again on their next login.
Rublon Remembered Devices FAQ
Common questions about Rublon Remembered Devices including features, pricing, alternatives, and user reviews.
Rublon Remembered Devices is MFA bypass policy for trusted devices with configurable time limits. developed by Rublon. It is a IAM solution designed to help security teams with MFA, Authentication, Access Control.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Agentless cloud security platform for risk detection & prevention
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox