Nimbus-Key® Instructions & Tutorials

Learn how to register, authenticate, deploy the WordPress plugin, enroll corporate users, and manage accounts. This page centralizes the official how-to videos.

  • QR + PIN passwordless login explained
  • End-user mobile app enrollment
  • WordPress plugin setup and policy enforcement
  • Corporate / enterprise onboarding
  • How to revoke / delete accounts
Secure QR+PIN Registration Flow

Passwordless login replaces shared passwords and blocks brute-force bots.

Step-by-step video tutorials

Each clip below walks through a key part of the Nimbus-Key® workflow: registration, login flow, WordPress plugin usage, and corporate onboarding. You can reuse these videos internally for training.

1. Authentication Factors
User Authentication & Login Security Spectrum
What does “passwordless” actually mean? This walkthrough explains the difference between weak passwords, SMS codes, and strong QR + PIN with cryptographic signing.
2. Mobile App Setup
Nimbus-Key® Mobile App Registration
Shows how a new user enrolls in the Nimbus-Key® mobile app, chooses a personal PIN, and links their identity so they can log in by scanning a QR.
3. Portal / Community
Join Cybersecurity1.net
How to join the Nimbus-Key® / Cybersecurity1.net environment and access protected resources. Good for MSPs, partners, and tech leads.
4. WordPress Plugin
WordPress Plugin Registration / Activation
Shows how to register the Nimbus-Key® WordPress Plugin, map it to your Tenant ID, and enforce QR+PIN login for wp-admin.
5. Enterprise Onboarding
Corporate Registration Flow
Walks through how an enterprise / organization registers users into a managed Nimbus-Key® tenant for policy-based access (Google Workspace, Microsoft 365, Salesforce, EMR/EHR, etc.).
6. Account Management
Delete / Revoke an Account
Shows how to remove a user’s access and cleanly revoke an identity, so ex-employees or contractors can’t continue logging in.

Ready to enforce passwordless access?

Deploy QR+PIN, prove exactly who logged in, and shut down password-based attacks across WordPress, cloud apps, and internal tools.