Search Results:
×The Device-based Adaptive Authentication method enables administrators to grant end-users the ability to register a limited number of trusted devices, typically browser sessions, for their account. Once a user's device has been registered, they can log in without any restrictions. However, if the number of registered devices exceeds the administrator's defined limit, the user may be challenged or denied access based on the established policy. This approach enhances security by allowing authorized devices while controlling access from unregistered or potentially unauthorized devices.
Device Restriction operates by restricting the usage of an application exclusively to the intranet or office premises, preventing user access from outside the network. Additionally, it allows selective access for specific users from outside the network by creating distinct groups.
Grant login access without restrictions if the user meets the necessary criteria.
Prompt the user to undergo additional authentication, such as two-factor authentication (2FA), for enhanced security.
Reject the login attempt if it fails to meet the required criteria or poses a significant risk.
per user per month
*Please contact us to get volume discounts for higher user tiers.
Adds an extra layer of security by limiting application access only to trusted devices within the intranet or office premises. This helps to prevent unauthorized access from outside the network, reducing the risk of data breaches or unauthorized usage.
Administrators can define different groups of users with varying levels of access permissions. This allows selective access for specific users from outside the network while maintaining strict restrictions for others. It provides flexibility in managing access based on user roles or requirements.
Restricting access to trusted devices minimizes the risk of compromised or unsecured devices accessing the application. This helps protect sensitive information and reduces the likelihood of security vulnerabilities stemming from unauthorized or untrusted devices.
Device-based restriction can assist organizations in meeting compliance requirements by ensuring that access to sensitive applications is limited to approved devices within a secure network environment. This helps organizations align with industry-specific regulations and maintain data integrity.
Once a device is registered and designated as a trusted device, users can log in without any additional restrictions or authentication challenges. This streamlined login process improves user experience and productivity by eliminating unnecessary barriers to access.
An advanced level of authentication with two or more levels of security factors such as OTP over SMS, TOTP tokens, OTP over Email, hardware tokens etc.
Restrict the number of devices the users can access the services on, Geo-location, IP restriction, time of login, etc.
It provides an additional layer of MFA security based on risk and access provided by the security admin to control user access.
Our Other Identity & Access Management Products