cidaas Multi factor Authentication
Digitalization is in – but how far has your authentication mechanisms evolved to adapt to the digital transformation? Reports suggest that 81% of data breaches happen due to weak passwords.
Do you still believe that a complex password that is changed frequently is sufficient to secure your critical data? Then, it’s time to think big!
Multi-Factor Authentication (MFA), also known as Two-Factor Authentication (2FA), has become one of the most important tools for the protection of sensitive data – Passwordless authentication by querying a second factor can be done leveraging biometric factors such as fingerprint, face scan, etc. or via one-time passwords or SMS. If these factors are used instead of passwords, both higher data security and better user comfort are achieved.
The factors used in multi-factor authentication to uniquely identify a person are based on the following:
Knowledge (eg. Password)
Ownership (eg. Access Token)
Inheritance (eg. Biometric factors)
This makes it possible to uniquely verify the identity of a person and provide secure access. At the same time, the risk of data theft is reduced – be it when accessing patients’ medical records, during a payment transaction, when accessing sensitive company information or even when combating a phishing attack.
Why smart MFA?
To make digital business processes more secure and productive – that is what ‘Smart MFA’ stands for. The use of multiple risk and contextual factors form the basis here. Which authentication method suits which application the most – enterprises can choose and easily customize their preferred modes of authentication for each of their applications using our advanced APIs – be it No MFA, Always MFA or Smart MFA.
For e.g., you can allow users to perform low value transactions from trusted locations and devices without interruption, while mandating multi-factor authentication during high-value transactions on untrusted networks and devices.
At cidaas, we offer you the following unique identification methods:
Face recognition, Voice Recognition, Fingerprint recognition, Pattern recognition, TOTP and Smart Push apart from Email, SMS, IVR, Backup Codes and FIDO based verifications.
Do you face similar issues like this Gentleman, John?
- He finds it cumbersome to remember complex passwords
- He is not convinced of the security these passwords provide
- He wants a double check on the important transactions he makes
Let’s see how cidaas MFA comes to his rescue!Get Started
John accesses the Business website that uses cidaasNext
John Successfully configures Face DetectionNext
John performs a passwordless authenticationNext
John logs in to the business website
Advanced logins without passwords like no other CIAM solution in the market
Orientation points that provide facial attributes for the unique Identification of the user.
The voice signature of a person is biometrically unique and can therefore be used for secure verification.
Most of the devices are already support the fingerprint technology. We utilize this technique for authentication.
Identity verification that needs the user to confirm his chosen pattern, like the commonly used mobile lock-pattern.
Technique that uses push notification on a mobile device and requires the user to select the correct code.
TOTP stands for Time- based One-time Password - is a temporary passcode (six or eight digit), generated by an algorithm, used for authenticating users based on time and device.
In the event that you have misplaced your phone or cannot receive codes via SMS, voice call, or cidaas authenticator app, you can use backup codes to sign in.
FIDO U2F uses USB based security technology. It stores private keys and generates a digital signature that is used to login.
Default option where verification codes are sent by Email.
Verification codes are sent by text message.
Verification codes are sent by Voice call.
cidaas in action
The future is here. Check out the options you can offer your customers on your portals.