SlideShare a Scribd company logo
AI powered Adaptive Multi-factor Authentication
Authentication
Authentication is the process of ensuring that the users are whom they claim to be. It is the first step in any security
process and involves matching a users claimed identity against one or more authentication factors that are bound to
that credential.
Need for Authentication
● Due to increase in adoption of Cloud technology, rise of social networking and the increased amount of online
data sharing has led to the need for strong authentication methods.
● The IT department can no longer rely on simple username and password credentials for security.
● With critical data and applications online, strong authentication for every user is essential to secure the business
process.
Copyright © 2022 E-Lock. All rights reserved Confidential
Authentication is Evolving
Authentication has come a long way from just username and passwords. Two-factor authentication (2FA) is almost
everywhere, Multi-factor Authentication (MFA) has become integral to enterprise security and now Adaptive Authentication
is the way forward.
Copyright © 2022 E-Lock. All rights reserved Confidential
Types of Authentication
Also known as Basic or Primary authentication, is the
process of authenticating using just one factor such
as password or security pin to grant access to a
system or application
Adding a layer of complexity, 2FA requires a second
factor to verify a user’s identity.
Multi-factor authentication provides an additional layer
of security for added protection and helps against
security threats by requiring two or more factors of
authentication
Adaptive authentication is an evolved form of MFA
where the authentication mechanism is decided
depending on the user’s risk profile and the behaviour
pattern.
Single factor authentication
Two-factor authentication (2FA)
Multi-factor authentication (MFA)
Adaptive multi-factor authentication (AMFA)
Copyright © 2022 E-Lock. All rights reserved Confidential
Knowledge factor
● Something the user knows
● Password, pin
Authentication factors
Possession factor
● Something the user has
● Certificate, phone, token,
smart card
Inheritance factor
● Something the user is
● Fingerprint, retina
Copyright © 2022 E-Lock. All rights reserved Confidential
Adaptive Authentication
E-Lock AdaptAuth
E-Lock AdaptAuth is an AI-powered Adaptive Multi-factor Authentication solution. AdaptAuth uses a combination of real-time
evaluation of contextual factors and statically configured authentication policies to determine the selection and flow of MFA factors
for every individual authentication request.
This is achieved by building a risk profile for every user by analyzing past authentication attempts and behavioral patterns. The extent
of deviation from such patterns invokes additional MFA factors until desired levels of identity assurance are achieved.
Through such intelligent adoption of authentication flows AdaptAuth achieves the right balance between security and user
experience.
Copyright © 2022 E-Lock. All rights reserved Confidential
E-Lock AdaptAuth Building Blocks
AdaptAuth Authentication Server
Provides essential functionalities of an
authentication server. Manage user identities,
implement basic authentication, 2FA and Single-
Sign On (SSO).
AdaptAuth Multi-factor Authentication
Custom authentication flows based on different
business requirements. Select from multiple ready-
to-use authentication factors beyond basic
authentication.
AdaptAuth Risk Profile
Our AI-powered anomaly detection and classification
mechanism evaluates risk associated with each
authentication attempt based on numerous context
parameters such as IP addresses, geo-locations,
device signatures and user behavior patterns.
AdaptAuth Policy Manager
Configure authentication policies based on
organizational requirements.
AdaptAuth Device Signature
A device registration, identification, remembering
and tracking mechanism to allow safer access from
anywhere both for devices issued by organization
and BYOD.
AdaptAuth Dashboard
Real-time monitoring and reporting of
authentication requests and events.
Copyright © 2022 E-Lock. All rights reserved Confidential
MFA factors supported by AdaptAuth
Open Web Standards
Copyright © 2022 E-Lock. All rights reserved Confidential
AdaptAuth Advantage
• Reduced reliance on passwords and other single-factor
authentication methods
• Improved user experience and reduced friction in
authentication flows
• Seamless switching between enterprise apps with Single
Sign-On
• Real-time monitoring and reporting of authentication
events
• Save system admin and IT hours with self-service user
enrollment
• Efficient and cost-effective way to secure enterprise
applications
• Digital Signature Certificate & PKI-based authentication
Conclusion
Authentication technology is ever changing. Businesses have to move beyond passwords and think of authentication as a means
of enhancing the user experience. Authentication methods eliminate the need to remember long and complex passwords. As a
result of enhanced authentication methods and technologies, attackers will not be able to exploit passwords, and a data breach
will be prevented.
Copyright © 2022 E-Lock. All rights reserved Confidential
THANK YOU!
For more information: Visit- www.adaptauth.com
Or write to info@adaptauth.com
About E-Lock
E-Lock is pioneer in the field of Digital and Electronic signature solutions. E-Lock's PKI-based solutions have made digital
signatures popular in common business applications and web-based transactions. Compliance with the global standards for digital
signatures has allowed E-Lock to serve organizations in more than 30 different countries, spanning several industries, effectively
and efficiently. This has resulted in massive customer base for E-Lock in countries like the US, the UK, Australia, Greece, Spain,
Hong Kong, Peru, Romania, Kuwait, Portugal, South Africa, Singapore, Lithuania, India, Malaysia, and many more.
It has now entered authentication space with a comprehensive solution providing several features such as basic authentication,
Two-factor authentication, Multi-factor authentication, Single Sign-On (SSO) and Adaptive MFA.
Copyright © 2022 E-Lock. All rights reserved Confidential

More Related Content

E-Lock AdaptAuth.pptx

  • 1. AI powered Adaptive Multi-factor Authentication
  • 2. Authentication Authentication is the process of ensuring that the users are whom they claim to be. It is the first step in any security process and involves matching a users claimed identity against one or more authentication factors that are bound to that credential. Need for Authentication ● Due to increase in adoption of Cloud technology, rise of social networking and the increased amount of online data sharing has led to the need for strong authentication methods. ● The IT department can no longer rely on simple username and password credentials for security. ● With critical data and applications online, strong authentication for every user is essential to secure the business process. Copyright © 2022 E-Lock. All rights reserved Confidential
  • 3. Authentication is Evolving Authentication has come a long way from just username and passwords. Two-factor authentication (2FA) is almost everywhere, Multi-factor Authentication (MFA) has become integral to enterprise security and now Adaptive Authentication is the way forward. Copyright © 2022 E-Lock. All rights reserved Confidential
  • 4. Types of Authentication Also known as Basic or Primary authentication, is the process of authenticating using just one factor such as password or security pin to grant access to a system or application Adding a layer of complexity, 2FA requires a second factor to verify a user’s identity. Multi-factor authentication provides an additional layer of security for added protection and helps against security threats by requiring two or more factors of authentication Adaptive authentication is an evolved form of MFA where the authentication mechanism is decided depending on the user’s risk profile and the behaviour pattern. Single factor authentication Two-factor authentication (2FA) Multi-factor authentication (MFA) Adaptive multi-factor authentication (AMFA) Copyright © 2022 E-Lock. All rights reserved Confidential
  • 5. Knowledge factor ● Something the user knows ● Password, pin Authentication factors Possession factor ● Something the user has ● Certificate, phone, token, smart card Inheritance factor ● Something the user is ● Fingerprint, retina Copyright © 2022 E-Lock. All rights reserved Confidential
  • 6. Adaptive Authentication E-Lock AdaptAuth E-Lock AdaptAuth is an AI-powered Adaptive Multi-factor Authentication solution. AdaptAuth uses a combination of real-time evaluation of contextual factors and statically configured authentication policies to determine the selection and flow of MFA factors for every individual authentication request. This is achieved by building a risk profile for every user by analyzing past authentication attempts and behavioral patterns. The extent of deviation from such patterns invokes additional MFA factors until desired levels of identity assurance are achieved. Through such intelligent adoption of authentication flows AdaptAuth achieves the right balance between security and user experience. Copyright © 2022 E-Lock. All rights reserved Confidential
  • 7. E-Lock AdaptAuth Building Blocks AdaptAuth Authentication Server Provides essential functionalities of an authentication server. Manage user identities, implement basic authentication, 2FA and Single- Sign On (SSO). AdaptAuth Multi-factor Authentication Custom authentication flows based on different business requirements. Select from multiple ready- to-use authentication factors beyond basic authentication. AdaptAuth Risk Profile Our AI-powered anomaly detection and classification mechanism evaluates risk associated with each authentication attempt based on numerous context parameters such as IP addresses, geo-locations, device signatures and user behavior patterns. AdaptAuth Policy Manager Configure authentication policies based on organizational requirements. AdaptAuth Device Signature A device registration, identification, remembering and tracking mechanism to allow safer access from anywhere both for devices issued by organization and BYOD. AdaptAuth Dashboard Real-time monitoring and reporting of authentication requests and events. Copyright © 2022 E-Lock. All rights reserved Confidential
  • 8. MFA factors supported by AdaptAuth Open Web Standards Copyright © 2022 E-Lock. All rights reserved Confidential
  • 9. AdaptAuth Advantage • Reduced reliance on passwords and other single-factor authentication methods • Improved user experience and reduced friction in authentication flows • Seamless switching between enterprise apps with Single Sign-On • Real-time monitoring and reporting of authentication events • Save system admin and IT hours with self-service user enrollment • Efficient and cost-effective way to secure enterprise applications • Digital Signature Certificate & PKI-based authentication Conclusion Authentication technology is ever changing. Businesses have to move beyond passwords and think of authentication as a means of enhancing the user experience. Authentication methods eliminate the need to remember long and complex passwords. As a result of enhanced authentication methods and technologies, attackers will not be able to exploit passwords, and a data breach will be prevented. Copyright © 2022 E-Lock. All rights reserved Confidential
  • 10. THANK YOU! For more information: Visit- www.adaptauth.com Or write to info@adaptauth.com About E-Lock E-Lock is pioneer in the field of Digital and Electronic signature solutions. E-Lock's PKI-based solutions have made digital signatures popular in common business applications and web-based transactions. Compliance with the global standards for digital signatures has allowed E-Lock to serve organizations in more than 30 different countries, spanning several industries, effectively and efficiently. This has resulted in massive customer base for E-Lock in countries like the US, the UK, Australia, Greece, Spain, Hong Kong, Peru, Romania, Kuwait, Portugal, South Africa, Singapore, Lithuania, India, Malaysia, and many more. It has now entered authentication space with a comprehensive solution providing several features such as basic authentication, Two-factor authentication, Multi-factor authentication, Single Sign-On (SSO) and Adaptive MFA. Copyright © 2022 E-Lock. All rights reserved Confidential