Skip to main content
Skip table of contents

AUTHENTICATION METHODS​

Confirming Identity through Knowledge, Possession, and Biometric Factors


​Native integration with Entrust IAM authentication capabilities​

Entrust Identity and Access Management portfolio is part of the core of our digital building blocks.​

Protecting the identities of workers, consumers, and citizens is critical to preventing uncontrolled access, data breaches, and fraudulent transactions. ​

And as one unified IAM portfolio, Entrust Identity combined with EIO supports an unprecedented number of use cases and deployment options, including a strong foundation to achieve a Zero Trust framework.​

Wide Range of Authenticators​

A variety of authenticators, including hardware tokens and mobile push OTPs, are available to simplify the transition from basic to high-assurance authentication and adapt to new technologies and business processes.​

Users have access to various authentication options, both physical and non-physical. Physical form factors include tangible devices such as one-time passcode tokens, grid cards, eID cards, and biometrics. On the other hand, non-physical authentication methods encompass knowledge-based authentication, out-of-band authentication, and mobile security capabilities. These options include mobile smart credentials and SMS or in-app soft tokens, offering a comprehensive range of authentication choices to cater to user preferences and security requirements.​

Transparent Authentication​

Multiple transparent authentication methods, such as digital certificates, IP geolocation, and device authentication, can validate users without daily involvement.​

Adaptive risk-based access and authentication​

This advanced security approach evaluates the risk level associated with a user's access request and tailors the authentication process accordingly. This method considers user behavior, device information, location, and access time to determine the risk associated with each access request. ​

Compliance and Security​

This solution supports the highest security standards while ensuring compliance with industry regulations.​

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.