Graphic Airlock Secure Acces Hub

Authentication

Strong, adaptable and user-friendly

As convenient as possible, as secure as necessary – this principle is especially important when it comes to authentication, as too little security endangers the user’s data but too much will severely impact user-friendliness. The Secure Access Hub can adapt to meet the needs of users and the requirements of CISOs alike.

Strong authentication

Social engineering and phishing are still the most widespread forms of attack on the Internet. Such attacks are designed to steal secret authentication information, such as a password.

Airlock supports a variety of strong authentication methods that successfully prevent social engineering and phishing, whilst ensuring an optimal user experience. Push authentication is an excellent example where a user logs in securely without the need to enter a password or a PIN number. Biometric methods, such as Touch ID or Face ID, can also be used for all applications.

Adaptive authentication

Strong authentication with two factors is standard today for business-critical web applications. In daily use, however, users often consider this security measure to be rather inconvenient.

This is precisely where risk-based authentication, also known as ‘adaptive authentication’, will improve the user experience. Instead of requiring users to enter the second factor for every login, the context of an access attempt is analysed and compared with previous sessions by the same user. Factors considered include the network in which users are operating, where they are logging in from and which browser they are using. In cases where users wish to access services from their usual workstation on the intranet or from their home offices, the second factor can be dispensed with.

User identities are also stored in the browser using the ‘remember me’ function, and re-used for future log-ins.

Step-up authentication

Step-up authentication is another option for implementing high-level security in a user-friendly manner. Instead of enforcing the highest level of security from the outset, security is limited to the necessary level. In areas where no authentication is needed, none is requested. In areas where moderate security is required, a simple authentication will suffice. The second factor is applied only when an area is accessed, where enhanced trust levels are essential. This stage-by-stage increase in trust levels is called ‘step-up’ authentication and is simple and easy to deploy for all applications.

Authentication highlights

  • A range of commercial authentication options can be integrated into Airlock IAM
     
  • Interfaces with various open-source authentication options
     
  • Single Sign-on
     
  • Simple token migration via user self-services
     
  • Risk-based authentication
     
  • Flexible step-up procedures
     
  • Social login and registration
     
  • Remember-me function
     
  • Identity federation of all relevant standards
     
  • Identity propagation

Ready for excellent IT security?

Contact us now.
Ergon Informatik AG+41 44 268 87 00

Information for you

-Our whitepapers-

Executive View: KuppingerCole - Airlock Secure Access Hub for applications and APIs

This KuppingerCole Executive View report provides an architectural and functional overview of the Airlock Secure Access Hub, an integrated platform for secure access management - a multicloud-native security tool for web applications, APIs and beyond.

 

Fill out the form now and receive Executive View!

Whitepaper: Security for cloud-native applications

You can read about how companies can ensure the security of web applications and APIs in Kubernetes in the white paper "Security for cloud-native applications", which was created in collaboration between heise and Airlock.

 

Request whitepaper

Whitepaper: Zero Trust is a journey

The ongoing digital transformation of the world is progressing and having a profound impact on our personal and professional lives in ways that were difficult to imagine just a few years ago.


This white paper discusses the effects of continuous digitalization and its impact.

Request free of charge

Off to DevSecOps

In this white paper, you will learn the most important insights into how you can implement DevSecOps successfully and efficiently, which security components are required for this and the advantages of a microgateway architecture.

 

Request free of charge

Airlock 2FA - Strong authentication. Simple.

Double security - this is what two-factor authentication offers in the field of IT security.


Find out more about strong authentication and the possibilities offered by Airlock in our white paper.

Download for free

Further whitepapers

We provide you with free white papers on these and other topics:

 

  • Successful IAM projects
  • compliance
  • Data protection (DSGVO)
  • Introduction of PSD2
  • PCI DSS requirementsPCI DSS requirements
Request free of charge