OptimalMFA -Multi-Factor Authentication Solutions

Activate Two Factor Authentication Based On Your Own Specified Business Rules – The OptimalCloud platform offers two factor authentication, also called multi-factor authentication, for those situations or applications that require additional security. Like all components of the OptimalCloud, the service is completely customizable, allowing you to activate multi-factor authentication based on your own specified business rules. For example, you can configure it to require two-factor authentication (2FA) when accessing an application off of the corporate network, or on an application-by-application basis. One option for two-factor authentication (2FA) supported out of the box by the OptimalCloud is Time-based One-Time Password (TOTP). TOTP is an algorithm that generates a one-time password based on a shared secret key and current time stamp that is the foundation of OATH. Time-based one-time passwords are appealing because they provide a higher level of security, requiring a traditional static password and a TOTP which changes every 30 to 60 seconds, making it extremely resistant to attacks and security breaches.

Since 81% of cyber security breaches are due to stolen, weak or default passwords, MFA is very important for your authentication system. Implementing MFA, especially adaptive multi-factor identification, will help ensure security on all applications so your customers don’t have to worry about their credentials being compromised and their information being stolen. 

Register for a Free Trial Today!

Interested in the features and benefits of Optimal IdM? Request a demo & find the best multi-factor authentication software for your business needs!   Request Demo

Custom MFA Service Provider

The Optimal Time-based One-Time Password (TOTP) MFA service available through The OptimalCloud, includes granular administrative control, SMS for non-smartphone users and email options in addition to the TOTP functionality which is available for an affordable flat monthly fee instead of costly charge per device models used by other identity providers. Request a free trial to see if Optimal IdM’s enterprise multi-factor authentication solution is right for you business.

The Optimal TOTP service works with any TOTP compliant authentication application including those available from Google, Microsoft, and Optimal IdM’s very own, “Optimal Authenticator” which is available to download for free in app stores. The Optimal Authenticator works for all Android, Windows and IOS operating systems. The agility of The OptimalCloud solution allows you to use Optimal’s own TOTP or SMS implementation, or use any standard solution from multi-factor authentication vendors such as SecurID, Safenet, etc. Our two factor authentication solution, called OptimalMFA, is so versatile, we can integrate with any two-factor application. In fact, we value our customizable service and commitment to you so much, if we don’t currently support your multi-factor authentication protocol, let us know and we can have it integrated in no time.

Learn More About The OptimalCloud    View Pricing

Benefits of Multi-Factor Authentication


Many state, federal and other compliance standards specify that organizations need to implement multi-factor authentication, especially for protecting sensitive data such as financial details and other personal information.


The extra layers of security this service provides means that even if a hacker gains access to the password, they still won't be able to move forward without access to the second step of verification.


The second step verification often involves mobile authentication via push notification


This creates a streamlined, intuitive process so that there is not code and authentication needed for each step. It also allows for cohesion across platforms and devices without additional IT work.


Added MFA security allows for a simple single sign-in process. Once the user is authenticated through MFA, they can have access to any app without the need to log in to each separately.

Multi-User Authentication with The OptimalCloud

Secure Identity Data

When it comes to cloud security, the OptimalCloud offers custom MFA solutions which keeps your identity data safe and secure at all times. You can configure the OptimalCloud so that users must authenticate with two factors in order to access sensitive data. This insures that that only authorized users are able to access sensitive data.

Flexible Configuration

The OptimalCloud’s multi-factor authorization and authentication configuration is flexible, which allows you to offer adaptive MFA based on your own specified business rules. For example, you can configure it to require multi-factor when accessing an application off of the corporate network or on an application by application basis. Contact one of our support specialists to see how the Optimal IdM’s MFA solution can fit into your existing environment.

Read more on MFA

Optimal Authentication Service™

Part of the OptimalCloud solution, the Optimal Authentication Service (OAS) is a multi-factor authentication-as-a-service offering that allows customers to implement a variety of MFA solutions using their existing web and non-web applications. As a MFA service, OAS helps prevent phishing and man-in-the-middle attacks by delivering push notifications to a user’s registered mobile device which optionally works with fingerprint enabled systems. OAS includes time-based one-time password (TOTP) and traditional one-time passcodes (OTP) that can be sent via short message service (SMS), email or voice calls. Each can be used as a stand-alone option or in conjunction with a complete IAM program. The mobile two factor authentication service can also be used to provide passwordless access to applications by leveraging mobile device push authentication.

Request Demo

Stand Alone Multi-Factor Authentication-As-A-Service

OptimalMFA includes Time-based One-Time Password (TOTP), Short Message Service (SMS), Email and Optimal Push Authentication (OPA). OptimalMFA also offers behavioral biometric authentication, which can identify a person based on unique patterns exhibited when they interact with a device such as a tablet, smartphone or computer (including mouse and keyboard). Each can be used as a stand-alone option or in conjunction with a complete Identity Access and Management (IAM) program. OptimalMFA is part of the Optimal IdM OptimalCloud solution. The OptimalCloud is a complete Identity-as-a-Service (IDaaS) solution with delegated administration and workflow capabilities that can be customized to meet the specific needs of its clients. The OptimalCloud offers a private, secure and dedicated cloud which is essential for meeting corporate security and compliance restrictions. Further to that, The OptimalCloud’s built-in cloud reporting and analytics system provides real time historical audit record of all activity including detailed granular reporting which is stored in a dedicated private database. The OptimalCloud is billed as an affordable, flat monthly fee which fits with budgetary and approval requirements.


Adaptive Multifactor Authentication

Adaptive multifactor authentication was developed to make the MFA process easier for users so that they are not prompted for a second authentication every step of the way. Instead, the right authentication factors will be selected based on a user’s behaviors and risk profile as a continuous process rather than just once. Adaptive MFA can be configured in several ways:

  • Learn typical activities dynamically, based on preferences over time.
  • Set static policies to define risk levels of different factors, such as time of day/week, user role, location, resource importance and more.
  • Combination of dynamic and static policies.

Our adaptive multifactor authentication supports many different authentication methods, such as mobile authentication, push notifications and more. It will evaluate different factors, including:

  • User behavior: Has the user ever accessed this data or application before? Is it out of the ordinary from the person’s usual tendencies?
  • Device: Is the login coming from a familiar device?
  • Location: Where is the request coming from? Is the IP address or country of origin considered suspicious? Does it make sense that the user would be in this place at this time?

Adaptive multifactor authentification makes it easier for IT to manage the process, with fewer steps to incorporate, and it creates an easier and more secure user experience. It also makes it so that high-risk activities aren’t too easy to hack, and low-risk activities aren’t too burdensome. 

To find out more about our multi-factor authentication options, fill out our online form or give us a call today.



Typing Biometrics and Other Multi-Factor Authentication Methods: When Passwords Are Not Enough

Read More
Buyer's Guide to Multi-Factor Authentication

Read More
Authentication 101: Your Guide to Authentication

Read More

Can’t wait? Request A Free Trial & Find The Best Two Factor Authentication Solutions For Your Business.

Contact Us Start Your Free Trial View Pricing

Pin It on Pinterest