Hello there!

Need Help? We are right here!

support
miniOrange Email Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com

Adaptive Authentication

miniOrange Adaptive Authentication provides an additional layer of security and access control to cloud or on-premise.





Adaptive Authentication Passwordless Authentication flow diagram

What is Adaptive Authentication?

Adaptive authentication, also called as risk-based authentication, is an advanced form of multi-factor authentication (MFA). On a daily hand when users try to login with their username-password it's not enough to guard them from vulnerable cyber attacks like phishing, data breach and various other cyber threats. What adaptive authentication does is it prompts different authentication factors counting on the behavior, device IP, Geo-Location of the user which directly makes security level to the very best. miniOrange Adaptive Authentication aims to supply a far better experience to scale back the authentication burden on users while enforcing strong authentication where it's needed the foremost. For instance , when a user attempts to access an application via an unregistered device then they'll be prompted to register it. If the user logs in from a geographical location aside from their office, they'll be asked to answer security questions.


FEATURES

Dynamic Risk Assessments

Our Adaptive Authentication Engine collectes the user session attributes at runtime and calculates the precise decision result on the go.


Platform Independent

Our Adaptive Authentication Engine works in any device supporting a Web Browser. Additionally we also provide the same functionality using API's.


Variety of Restriction Methods

Restrict user access based on attributes such as IP Address, Device Fingerprint, Location & Time of Access.


Restrict User Access in Real Time Attribute Assessment

Eliminates the need to a fixed approach that forces more frequent user authentication as user session attributes are fetched and processed at runtime to calculate the decision result.


Improved Security with 2-Factor Authentication

Appropriate second factor authentication challenges are presented based on the Decision Result which forces the user to authenticate using the configued 2FA method.


One Universal Security Mechanism

Fraud Prevention, as a web service, eliminates the need for each custom application to develop specific security access methods. Additionally we also provide the same functionality using API's.


BENEFITS


Improved Security

Our Adaptive Authentication Engine calculates decision result at runtime which provides a strong extra layer of security.

Extendable Security model

Our Adaptive Engine can be used to provide a additional layer of security to make sure that only authorized users and devices can access the services.

Works with Single Sign-On

Adaptive Authentication can be enabled on top of Single Sign-On to provide a additional level of Security.


Use on Any Device

Take benefit of our Adaptive Authentication functionality on any device that supports a web-Browser.

Easy to understand and configure

Our Adaptive Authentication Engine provides four different restriction methods which can be configured easily.

API Integration

You can use our Adaptive Authentication API's to integrate additional security into your applications.


ADAPTIVE AUTHENTICATION METHODS



IP Restriction Configuration

In this restriction method admin configures a list of IP addresses to allow or deny access on and when a user tries to login into any of the applications configured with adaptive authentication, his IP address is checked against the configured IP list and based on that the action is decided as per the configuration (.i.e. Allow, Deny or Challenge).

Learn More  


Adaptive Authentication through configuring IP Restriction

Adaptive Authentication Device Restriction limiting device count




Device Restriction Configuration

In this restriction method admin allow end-users to add a fixed number of devices as Trusted devices for their account(A device here refers to a Browser Session). Once a device is registered for a user, then that user will be allowed to login without any Restriction (This works with all other Restriction methods also). If the users registered Device exceeds the total registered device limit specified by the admin,In that case the user will be either Challenged or Denied as specified in the policy by the admin.

Learn More  


Location Restriction Configuration

In this restriction method admin configures a list of locations where we want to allow end-users to either login or deny based on the condition set by the admin. When a user tries to login with adaptive authentication enabled, his Location Attributes such as (Latitude, Longitude and Country Code) are verified against the Location list configured by the admin. And based on this user will be either allowed, challenged or denied.

Learn More  


Adaptive Authentication based on Geo location Restriction


Risk-Based Authentication considering Time Restriction


Time Restriction Configuration

In this restriction method admin configures a time zone with Start and End Time’s for that time zone and users are either allowed, denied or challenged based on the condition in the policy. When an end-user tries to login with the adaptive authentication enabled, his time zone related attributes such as Time-Zone and Current System Time are verified against the list configured by the admin and based on the configuration the user is either allowed, denied or challenged.

Learn More  

Our Other Identity & Access Management Products