Multi Factor Authentication
A Password is not enough
A single password for access protection has long been obsolete, as it is easy to crack and is full of weaknesses. Often the same passwords are used for different accesses. Thus users, unknowingly, share passwords with various providers leaving them easily exposed to theft of some sort. Often the guidelines for password creation are partly to blame. They ask for too much and encourage employees to create passwords that are, by nature, not very strong or need to be written down somewhere to be remembered.
It is always useful to have an array of authentication available allowing for a “double check” of user identity or transaction. We therefore support a wide range of tokens. Push Tokens provide a high level of security and significantly improve user-friendliness. QR Tokens are also very easy to use and can be integrated into Windows or MacOSX logins and applications. We therefore support a wide range of tokens.Push Tokens provide a high level of security and significantly improve user-friendliness. QR Tokens are also very easy to use and can be integrated into Windows or MacOSX logins and applications. Whether classic with display or as FIDO U2F token, Hardware Tokens are suitable for external employees and high security requirements. Software tokens for smartphones and as text messages meet most security requirements and can be managed efficiently and cost-effectively.
One of the biggest hurdles in the use of multi-factor authentication systems is the management of user tokens. Especially in environments where different token types are used, the rollout and operation of a token can be very time-consuming. Through the self-service portal, administration of tokens can be partially or completely transferred to the users within a defined framework. Through the self-service portal, administration of tokens can be partially or completely transferred to the users within a defined framework. For smooth migration, pass-through tokens are available for users who have not yet been converted so that they can continue to have access as they change over to the new system.
Multi Factor Authentication Features
In addition to a RADIUS interface for remote access systems, modules for operating systems such as Windows, MacOS and Linux are available. SAML for modern authentication solutions and an API interface for direct integration into applications are also available.
Through an API-First approach, unlimited possibilities in the use of Multi- Factor Authentication is made possible. Integration into your management tools, user self-service portals, products and applications, gives you full flexibility and low costs in implementation and development.
In order to integrate seamlessly into existing IT infrastructures and applications, a large number of interfaces are supported. All confidential material is stored in encrypted form. An additional HSM can be used on request. This ensures that all keys are generated and managed securely and independently of your infrastructure.
Mullti-Factor Authentication Service
Clue Multi-Factor Authentication enables secure deployment of remote access systems and secures access to local and cloud applications. This eliminates one of the largest attack vectors on your IT systems. Together with you, our security experts develop a suitable authentication concept and implement the necessary tools. This also includes the full operation of the required appliances, such as the regular creation of back-ups, software release and lifecycle management as well as the monitoring of health and security events.
Clue Managed Services expands your team by giving you reliable access to security experts who help you to strengthen the security of your company. Proven products, tailor-made features and your very own personal support structure – we meet your requirements at a low TCO. The monthly service fee eliminates high investments and training costs, enabling you to use our services in a modular way.
Would you like to protect to your systems and applications against unauthorized access? Do you develop applications and services and want to integrate secure authentication quickly and easily? We would be pleased to inform you off the possibilities surrounding Multi-Factor Authentication and how it can be tailor-made and securely installed in your business.