SLX Connect Adaptive Authentication provides an additional layer of security and access control to cloud or on-premise.
What is Adaptive Authentication?
Adaptive authentication, also called as risk-based authentication, is an advanced form of multi-factor authentication (MFA). On a daily hand when users try to login with their username-password it's not enough to guard them from vulnerable cyber attacks like phishing, data breach and various other cyber threats. What adaptive authentication does is it prompts different authentication factors counting on the behavior, device IP, Geo-Location of the user which directly makes security level to the very best. SLX Connect Adaptive Authentication aims to supply a far better experience to scale back the authentication burden on users while enforcing strong authentication where it's needed the foremost. For instance , when a user attempts to access an application via an unregistered device then they'll be prompted to register it. If the user logs in from a geographical location aside from their office, they'll be asked to answer security questions.
Our Adaptive Authentication Engine calculates decision result at runtime which provides a strong extra layer of security.
Extendable Security model
Our Adaptive Engine can be used to provide a additional layer of security to make sure that only authorized users and devices can access the services.
Works with Single Sign-On
Adaptive Authentication can be enabled on top of Single Sign-On to provide a additional level of Security.
Use on Any Device
Take benefit of our Adaptive Authentication functionality on any device that supports a web-Browser.
Easy to understand and configure
Our Adaptive Authentication Engine provides four different restriction methods which can be configured easily.
You can use our Adaptive Authentication API's to integrate additional security into your applications.
IP Restriction Configuration
In this restriction method admin configures a list of IP addresses to allow or deny access on and when a user tries to login into any of the applications configured with adaptive authentication, his IP address is checked against the configured IP list and based on that the action is decided as per the configuration (.i.e. Allow, Deny or Challenge).
Device Restriction Configuration
In this restriction method admin allow end-users to add a fixed number of devices as Trusted devices for their account(A device here refers to a Browser Session). Once a device is registered for a user, then that user will be allowed to login without any Restriction (This works with all other Restriction methods also). If the users registered Device exceeds the total registered device limit specified by the admin,In that case the user will be either Challenged or Denied as specified in the policy by the admin.
Location Restriction Configuration
In this restriction method admin configures a list of locations where we want to allow end-users to either login or deny based on the condition set by the admin. When a user tries to login with adaptive authentication enabled, his Location Attributes such as (Latitude, Longitude and Country Code) are verified against the Location list configured by the admin. And based on this user will be either allowed, challenged or denied.
Time Restriction Configuration
In this restriction method admin configures a time zone with Start and End Time’s for that time zone and users are either allowed, denied or challenged based on the condition in the policy. When an end-user tries to login with the adaptive authentication enabled, his time zone related attributes such as Time-Zone and Current System Time are verified against the list configured by the admin and based on the configuration the user is either allowed, denied or challenged.