Skip to main content
Secure OAuth 2.1 Authentication

Aid4Mail Remote Authenticator

Grant investigators secure, temporary access to your email account without sharing your password or installing any software.

No license required
Password never shared
Revocable access

How It Works

1

Download & Run

Download the authenticator and run it directly. No installation needed—it works immediately on any Windows PC.

2

Authenticate Securely

Log into your email account through secure OAuth 2.1 (Google/Microsoft) or encrypted IMAP credentials.

3

Share Token

Generate a secure token file and send it to the investigator. Your password is never included or visible.

Complete Control Over Access

You can revoke Aid4Mail’s access at any time by invalidating the token through your email provider’s security settings. For IMAP accounts, you can also set an automatic expiry date.

Key Security Features

OAuth 2.1 Protocol

Uses industry-standard OAuth 2.1 for Google and Microsoft accounts, ensuring maximum security without password exposure.

Encrypted IMAP Tokens

For IMAP accounts, passwords are encrypted within the token and can include automatic expiry dates for added security.

No Installation Required

Runs directly without installation, leaving no traces on your computer. Perfect for corporate environments with IT restrictions.

Revocable Access

Maintain full control—revoke access instantly through your email provider’s security settings whenever needed.

No License Needed

Free to use without any Aid4Mail license. Perfect for custodians and clients who need to provide email access.

Time-Limited Tokens

Set automatic expiry dates for IMAP tokens, ensuring access is automatically revoked after the investigation period.

Who Uses Remote Authenticator?

Legal Discovery

Law firms collecting email from clients for litigation. Clients maintain control while providing necessary access for discovery.

Corporate Investigations

HR departments and compliance teams collecting employee emails for internal investigations while maintaining privacy.

Digital Forensics

Forensic investigators collecting evidence from custodian accounts without compromising the chain of custody.

Regulatory Compliance

Organizations responding to regulatory requests while ensuring data security and maintaining audit trails.

System Requirements

Operating System

  • Windows 11
  • Windows 10
  • Windows 8.1
  • Windows 7 SP1

Technical Details

  • 32-bit and 64-bit compatible
  • File size: ~5 MB
  • No installation required
  • Internet connection for OAuth

Supported Email Services

Gmail (OAuth 2.1)
Microsoft 365 (OAuth 2.1)
Outlook.com (OAuth 2.1)
Yahoo! Mail (IMAP)
AOL Mail (IMAP)
Any IMAP server

Ready to Provide Secure Email Access?

Download the Remote Authenticator now and maintain complete control over your email access.