Paid-Memberships Integrator | Paid-Memberships Integrator SAML SSO | Paid-Memberships SAML Plugin

Why Two-factor authentication ?

Multi-factor authentication (MFA) adds an additional security verification to your current protection and user authentication mechanism. Hence, makes it less vulnerable to hackers due to the additional verification factor. The user security is not compromised even if the first factor (user’s login credentials) are compromised. Two factor authentication is implemented to increase protection of both - user's credentials and the resources the user can access.


It is in use any time two authentication factors are required to gain access to a system por service. However, using two factors from the same category doesn't constitute 2FA. For example, requiring a password and a shared secret is still considered SFA as they both belong to the knowledge authentication factor type. Support for passwordless authentication. Passwordless uses more secure alternatives like possession factors (one-time passwords [OTP] verification of registered smartphones), or biometrics (fingerprint, retina scans).


Common two factor authentication methods

Email Token Authentication

Token-based authentication is a web authentication technique that allows users to confirm their identity once and obtain a one-of-a-kind encrypted token in return. In this method, code for authentication is sent to the user’s email address. It can work as an alternative to one time password or SMS based authentications.


Hardware Token Authentication

In Hardware token authentication, a hardware token is provided to the user and is one of the most secure authentication methods, as long as the key/token remains in the consumer’s possession.


SMS Token Authentication

In this method a code/PIN for authentication is sent as a text message to the user’s phone. This PIN is then used as a one-time password (OTP), usually in addition to traditional username and password verification methods. Software Token Authentication using third party authentication providers.


Software Token Authentication using third party authentication providers

Involves using an authentication provider application on a mobile device. Some common third party authentication providers include Google Authenticator, Microsoft Authenticator, Authy, etc. The passcode can be generated using an application like Google Authenticator or Authy.


Security Question/ Knowledge based authentication.

In this method the user is asked answers to static questions. The questions could be defined by the business or the customer,and the provided answers are later verified.


Features

Secure, Easy, Effective

Multi factor authentication solutions are easy to integrate in your application and are hassle free when it comes to using them

Passwordless Login using Username

Allows users to log in using Username and OTP thus, preventing the need to enter Password.

Remember my device

The feature remembers the personal device and thus allows users to directly login in the same saved device where the 2nd factor of authentication is not asked.

Restrict IP addresses

To provide an additional security measure to your application, it allows integration with the IP restriction module which restricts access from blacklisted IP addresses

Support for all phones

This has support for different types of smartphones like iPhone, Android, BlackBerry, Basic Phones, Landlines, etc.

Benefits

Enhanced security

Adding an additional layer of security reduces the risk of hackers breaking into your system and accessing resources under your name. The two step verification allows employees to safely access corporate systems from any device or location-without putting sensitive data at risk.

Hassle free login process

You have an option to use your username along with password and two-factor or just the username and two-factor.

Quick and easy one time setup

2FA solutions can be deployed quickly just within a few minutes.

Reduce help desk engagements

Two-Factor authentication decreases password-resets which are done by the help desks 2FA provides a safe way for users to reset their own passwords.

Alternative to the current 2FA solutions

In case you lose your phone, we offer alternate login methods like OTP Over Email and Security Questions (KBA) and if your phone is offline, you can use a one time passcode generated by the app to login.

Support for multiple authentication methods

Support for multi factor authentication for all type of phones such as Soft Token, QR Code Authentication,Push Notification are supported by miniOrange Authenticator App.

Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com