How Easy is it to Log In and Out of Mobile Command XR?
Let’s face it: you’re drowning in passwords. What was once a simple expression of your personality is now a dizzying mix of alphanumeric combinations, complete with special characters for every website and app you use – sometimes dozens of times a day. To make things even more complicated, you also have to manage passwords while remaining Criminal Justice Information Services (CJIS) compliant.
It’s understandable why so many prospects ask GUARDIAN RFID team members: How do I log in to Mobile Command XR? However, the real question is: How easy is it?
The good news is that Command Cloud offers a variety of options for login methods. Even better, most of these options are quick and simple – not burdensome. (While some methods have tradeoffs, that’s a discussion for you and your IT team.)
In this blog, we’ll briefly walk through the Command Cloud login options while also touching on CJIS compliance to help mitigate risks and avoid potential discrepancies.
For starters, note that Command Cloud supports several login methods including:
Username and password
RFID Fob
RFID Card
Single Sign On (SSO)
Facial Recognition
Username and Password
Let’s start with the standard approach: creating a username and password. Typically, your system administrator sets the username format, so don’t expect too much room for creativity. For ease of use, we advise against using employee email addresses. Typing in long usernames in a mobile app, like an email address, will make you rather put out a campfire with your face in a hurry.
In Command Cloud, your password must meet specific criteria: it should be eight characters long, including letters, numbers, and a special character. The user interface provides real-time feedback, just like many websites, to ensure you’re meeting our password requirements.
Once you’ve set your password, simply click Save and you’re ready to log in to Mobile Command XR.
RFID Fob
A second option for login is contactless: RFID Fobs. These fobs integrate a chip on a keyring that allows for seamless, contactless login. This is more common among users who prefer a key on their duty belt, adding to their existing collection of keys. Plus, it’s small and decently durable, making it easy to carry.
However, one downside to RFID Fobs is the lack of visual identification. If you drop your fob or leave it elsewhere, it can be hard to track down the rightful owner. So, it’s possible that they could be accidentally switched among users if not closely kept track of.
RFID Card
The most popular login method among our Warrior community – and the choice that we highly endorse –is using an RFID card. Your RFID card is encrypted, enabling contactless, secure access to Mobile Command XR.
RFID Cards can be customized to meet your agency’s visual identification needs. You can design them to include your photo, name, agency logo, and any other details that meet your agency’s unique requirements. This personalization makes RFID Cards not only more effective, but also more appealing than RFID Fobs.
In fact, some agencies have adopted their Command Cloud RFID Cards as their official government ID card, streamlining all identification needs onto a single card.
Additionally, RFID Fobs have a higher replacement rate compared to RFID cards. So, if you’re looking to reduce costs in terms of both supplies and man-hours replacing officer credentials – RFID cards are the optimal choice.
Single Sign On (SSO)
Single Sign-On (SSO) is an identification method that enables users to log in to multiple applications and websites with one set of credentials supported through integration with Microsoft Entra ID. This enables users to be created, managed, and removed through one directory and identity management service.
Thus, for agencies using identity and access management solutions, such as Microsoft Entra ID, Command Cloud offers native integration with Microsoft Entra ID, making it effortless to sing into Mission Command and Mobile Command XR using your Microsoft credentials.
The three advantages of SSO integration with Command Cloud are:
1. Enhanced Security: Centralized identity management improves overall security.
2. Automated User Management: With Command Cloud, you can build user groups and assign user privileges automatically based on how your users are assigned to groups in Entra ID.
3. Simplified Login: Staff will have one less username and password for your staff to remember.
While Command Cloud can support SSO integration with other identity management solutions, Microsoft Entra ID is the most widely used within our Warrior community. It’s important to note that this method includes a fee, and will not support social SSO integration, such as Google, Facebook, or X.
Facial Recognition
The latest login method for Mobile Command XR is facial recognition, offering a contactless and effortless experience – similar to an RFID Card. The primary advantage of facial recognition is its independence from needing to hold or track an RFID tag to log in.
Facial recognition uses your unique facial geometry to identify you biometrically. This efficiency makes it one of the fastest and most convenient login methods. You can be enrolled in VisionOps in seconds. And to comply with biometric privacy regulations, such as the Illinois Biometric Information Privacy Act (BIPA) and Texas Capture Or Use Of Biometric Identifier Act (CUBI), officers can opt in or out of biometric use.
Can I Switch User Profiles on the Fly?
If you’re going on break or your supervisor needs to perform a supervisory round in your unit without their SPARTAN, you don’t need to log out. You can instantly switch profiles on the fly by having your supervisor tap their RFID card to your SPARTAN. After this is done, simply tap your RFID card to resume your session.
What if I Lose my RFID Card?
If your RFID card is lost or missing, notify your supervisor immediately. A system administrator will deactivate your card in Mission Command and issue you new credentials. Similar to inmate identification (whether RFID wristbands or RFID cards), an officer cannot be assigned more than one RFID card at a time. Therefore, once the card is reported lost, the card becomes inactive and has no operational value.
Command Cloud offers various login options tailored to meet your security, operational needs, and budget while maintaining continued compliance with CJIS standards. If you’re unsure which direction is best, we recommend asking colleagues or nearby facilities for their insights. For any questions about any of these methods, don’t hesitate to contact us.