Centralized and mixed Strong Authenticaton Management
Organizations which are looking for more identity assurance deploy multiple authentication methods and tokens to address stronger authentication before access is granted within and beyond the corporate network. The most common scenarios that need strong authentication are remote access by VPN, Server Based Computing, windows logon, web (application) sign-on and even single sign-on.
, Single Sign-On
and managing strong authentication mechanisms
like Mobile and hardware based One-Time Passwords (OTP’s), USB Tokens with public key infrastructure (PKI) support and biometrics with your already existing user repository and administration can be a complex and costly task. ID Control Server reduces the complexity and cost of strong authentication
by providing a single, highly scalable platform
for managing all types of two-factor, two-way and three-factor authentication
credentials while integrating with your already existing user repository.ID Control Server
ID Control Server manages from a single, fully integrated and central platform for your blended and maybe even simultaneously used authentication means such as the mobile (OTP) authentication HandyID
, SMS-based One-Time Password MessageID
, hardware based ID Control OTP
and USB Tokens
with or without PKI
credentials, behaviour biometrics as KeystrokeID
and even third-party tokens.
ID Control Server is availabe as a onsite
and hosted solution
, so as hardware appliance, software
and/or virtual appliance
Due to the easy and low cost implementation, integration and reduction in the complexity of administration a much lower total cost of ownership can be achieved in order to manage different authentication methods and tokens.
ID Control Server first validates the user’s credentials in the administration for systems, applications and accounts for which access is demanded. After validation ID Control processes the attempts to verify the digital identity of the sender or receiver of the communication or transaction based on the authentication methods
and tokens needed in order to gain access or perform a transaction.