Adaptive Authentication
Get risk-based authentication that works behind the scenes
When users request access, the access context is assessed in real-time by our policy engine. And a decision is made to either grant access or challenge it. By automatically assessing each user login attempt, our technology speeds access to important data for the users who need it and are authorized to access it.
What is risk-based adaptive authentication?
Risk-based adaptive authentication considers a user's risk level when authenticating them to access a resource or system. The risk score is calculated by evaluating various factors such as location from which they are authenticating, type of device they are using, whether they are logging in from an IP address for a restricted geography, etc.
How does it work?
Experience the Benefits of Risk-Based Adaptive Authentication
To systems and data by requiring additional verification steps for high-risk users or activities.
By reducing the number of required login steps when risk is low.
To the specific needs of an organization, allowing for a more tailored approach to security by weighting factors based on the use case.
How to Improve User Experience
Intuitive, risk-based policy creation, configurable user roles, and robust reporting that provides critical insights into your user security profile.
Behind-the-scenes authentication enables users to effortlessly log in to workstations and applications and even open secure doors with just their phones.
Provision authenticators based on user requirements and risk.
How to Configure Risk-Based Adaptive Authentication
There are several ways to configure risk-based adaptive authentication, but here is a basic overview of the process:
Define the conditions that will trigger adaptive authentication. This can be based on factors like the user's location, the type of device they are using, or the time of day. Different weights can be applied to various factors based on the use case.
Select the multi-factor authenticator that will be used to verify the user's identity. This can include something they know (like a password), something they have (like a security token), or something they are (like their fingerprint).
Configure the system to challenge the user with the appropriate authentication factor(s) based on the conditions that are met and the risk levels that exceed a predefined threshold.
Request a demo today
An Entrust Identity portfolio specialist will be in touch with options soon.Identity Portfolio
High assurance cloud-based workforce and consumer authentication. Credential-based access including passwordless authentication with unified SSO.
High assurance workforce and consumer authentication. Credential-based authentication including physical smart card issuance. On-premises solution.
Best-in-class MFA and VPN protection for Windows-based workforces.
Our identity portfolio capabilities:
Authenticate
Authorize
Transact and Manage
The identity portfolio suited to your authentication needs
- Consumer
- Workforce
- Citizen
Consumer
Attract and retain customers with best-in-class mobile and online banking services.
Give customers frictionless access to your portals—and build a great brand experience.
Our portfolio integrates seamlessly with your Customer Identity Access Management (CIAM) strategies.
We have the trusted identity tools you need to be successful and in compliance.
Workforce
Our portfolio offers the necessary technologies to integrate physical and logical secure access.
Empower workers everywhere with always-on access to VPNs and SaaS applications.
Protect the critical application credentials of system administrators or senior leaders.
Get a true passwordless SSO solution that supports all devices, PCs and Macs, and cloud and on-premises apps.
Our solutions ensure application security for contractors using on-prem or cloud apps.
Remove complexity and enable highly secure mobility with proven PIV solutions.
Citizen
Use our portfolio to secure and manage passports, national ID's and driver's licenses.