Multi-Factor Authentication (MFA) Solutions
Activate Multi-Factor Authentication Based On Your Own Specified Business Rules
The OptimalCloud™ offers multi-factor cloud-based authentication for those situations or applications that require additional security. Like all components of the OptimalCloud, the service is completely customizable, allowing you to activate multi-factor authentication based on your own specified business rules. For example, you can configure it to require two-factor authentication (2FA) when accessing an application off of the corporate network, or on an application-by-application basis. One option for two-factor authentication (2FA) supported out of the box by the OptimalCloud is Time-based One-Time Password (TOTP). TOTP is an algorithm that generates a one-time password based on a shared secret key and current time stamp that is the foundation of OATH. Time-based one-time passwords are appealing because they provide a higher level of security, requiring a traditional static password and a TOTP which changes every 30 to 60 seconds, making it extremely resistant to attacks and security breaches. GET THE WHITEPAPER
Can’t wait?
Request A Free Trial of The OptimalCloud Today
Custom Two Factor Authentication Service Provider
The Optimal TOTP service available through The OptimalCloud, includes granular administrative control, SMS for non-smartphone users and email options in addition to the TOTP functionality which is available for an affordable flat monthly fee instead of costly charge per device models used by other providers. The Optimal TOTP service works with any TOTP compliant authentication application including those available from Google, Microsoft, and Optimal IdM’s very own, “Optimal Authenticator” which is available to download for free in app stores. The Optimal Authenticator works for all Android, Windows and IOS operating systems. The agility of The OptimalCloud solution allows you to use Optimal’s own TOTP or SMS implementation, or use any standard solution from multi-factor authentication vendors such as SecurID, Safenet, etc. Our two factor authentication solution, called OptimalMFA™, is so versatile, we can integrate with any two-factor application. In fact, we value our customizable service and commitment to you so much, if we don’t currently support your multi-factor authentication protocol, let us know and we can have it integrated in no time.
Benefits of Multi-Factor Authentication
Get simple, seamless and secure 2FA with The OptimalCloud.
Enjoy a completely customizable solution tailored to your business needs.
MEET AUDIT & COMPLIANCE INITIATIVES
INCREASED SECURITY & CONTROL
REDUCE IT COSTS
Multi-User Authentication with The OptimalCloud
Secure Identity Data
The OptimalCloud offers custom multi-factor authentication solutions which keeps your identity data safe and secure at all times. You can configure the OptimalCloud so that users must authenticate with two factors in order to access sensitive data. This insures that that only authorized users are able to access sensitive data.
Flexible Configuration
The OptimalCloud’s multi-factor authorization and authentication configuration is flexible, which allows you to offer multi-factor authentication based on your own specified business rules. For example, you can configure it to require multi-factor when accessing an application off of the corporate network or on an application by application basis.
Optimal Authentication Service™
Part of the OptimalCloud solution, the Optimal Authentication Service (OSA) is a multi-factor authentication-as-a-service offering that allows customers to implement a variety of MFA solutions using their existing web and non-web applications. As a MFA service, OAS helps prevent phishing and man-in-the-middle attacks by delivering push notifications to a user’s registered mobile device which optionally works with fingerprint enabled systems. OAS includes time-based one-time password (TOTP) and traditional one-time passcodes (OTP) that can be sent via short message service (SMS), email or voice calls. Each can be used as a stand-alone option or in conjunction with a complete IAM program. The service can also be used to provide passwordless access to applications by leveraging mobile device push authentication.