• 10.harddisk.jpg
  • 20.jpg
  • 30.keys.jpg
  • 40.mobile_phone.jpg
  • 50.padlock.jpg

ID Control Server

Centralized and mixed Strong Authenticaton Management
Organizations which are looking for more identity assurance deploy multiple authentication methods and tokens to address stronger authentication before access is granted within and beyond the corporate network. The most common scenarios that need strong authentication are remote access by VPN, Server Based Computing, windows logon, web (application) sign-on and even single sign-on.

However, provisioning, Single Sign-On and managing strong authentication mechanisms like Mobile and hardware based One-Time Passwords (OTP’s), USB Tokens with public key infrastructure (PKI) support and biometrics with your already existing user repository and administration can be a complex and costly task. ID Control Server reduces the complexity and cost of strong authentication by providing a single, highly scalable platform for managing all types of two-factor, two-way and three-factor authentication credentials while integrating with your already existing user repository.

ID Control Server
ID Control Server manages from a single, fully integrated and central platform for your blended and maybe even simultaneously used authentication means such as the mobile (OTP) authentication HandyID , SMS-based One-Time Password MessageID , hardware based ID Control OTP, CardID and USB Tokens with or without PKI credentials, behaviour biometrics as KeystrokeID and even third-party tokens.

ID Control Server is availabe as a onsite and hosted solution, so as hardware appliance, software and/or virtual appliance.
Due to the easy and low cost implementation, integration and reduction in the complexity of administration a much lower total cost of ownership can be achieved in order to manage different authentication methods and tokens.

ID Control Server first validates the user’s credentials in the administration for systems, applications and accounts for which access is demanded. After validation ID Control processes the attempts to verify the digital identity of the sender or receiver of the communication or transaction based on the authentication methods and tokens needed in order to gain access or perform a transaction.

What's your e-authentication method?