Manual – Peig for Mac and Windows

Using Peig for the first time

1. Start Peig

Launch the application or if already running make sure it is active (the big round button will be green).

2. Open a web page

Open your browser and type in URL of the page/server you wish to log in to.

3. Allow Peig to create a new identity (or use an existing identity)

Peig itself will recognise whether an identity has already been established for this server.

4. Complete the registration process

By following the instructions for each step carefully.

5. Create your Personal Factor

When creating you Personal Factor, you have a choice between two types of picture sequence (either numbers or symbols). Choose your sequence and then confirm it once more.

6. Done!

Congratulations! From now on, you can log into this server using Peig.

More features

Peig History

Double click on a service provider icon. A new window with history appears.

Deleting a Service provider

In case your identity is blocked / locked / corrupted, you can delete a SP in History window. Go to directory, select a service provider, then select Delete provider.

Settings

Personal factor

Change – If you already have a personal factor you may choose a new one.

Recovery – In case you forget / lose your password, click on "Recovery" button. Your service providers will be erased and you have to start over going through registration process.

Notification level

Here you can change the frequency of notifications about Peig acitivity.

The security level may be changed by dragging the selected cyber identity from one column to another.

  1. Low security level – Confirmation is not required for any operation with your cyber identity. All identity operations are automatically performed in the background.
  2. Medium security level – Requires confirmation for every identity change request (new identity, change/delete identity, etc.). Does not require confirmation when an identity is used (i.e. when using the identity to logon to a service).
  3. High security level – Requires confirmation for all operations concerning your cyber identity, including use (logon).

Name and color

Change the name of your Peig and what you want it to look like. This is particularly useful when you are using more Peigs, e.g. for backup purposes.