E-Lock AdaptAuth.pptx
- 2. Authentication
Authentication is the process of ensuring that the users are whom they claim to be. It is the first step in any security
process and involves matching a users claimed identity against one or more authentication factors that are bound to
that credential.
Need for Authentication
● Due to increase in adoption of Cloud technology, rise of social networking and the increased amount of online
data sharing has led to the need for strong authentication methods.
● The IT department can no longer rely on simple username and password credentials for security.
● With critical data and applications online, strong authentication for every user is essential to secure the business
process.
Copyright © 2022 E-Lock. All rights reserved Confidential
- 3. Authentication is Evolving
Authentication has come a long way from just username and passwords. Two-factor authentication (2FA) is almost
everywhere, Multi-factor Authentication (MFA) has become integral to enterprise security and now Adaptive Authentication
is the way forward.
Copyright © 2022 E-Lock. All rights reserved Confidential
- 4. Types of Authentication
Also known as Basic or Primary authentication, is the
process of authenticating using just one factor such
as password or security pin to grant access to a
system or application
Adding a layer of complexity, 2FA requires a second
factor to verify a user’s identity.
Multi-factor authentication provides an additional layer
of security for added protection and helps against
security threats by requiring two or more factors of
authentication
Adaptive authentication is an evolved form of MFA
where the authentication mechanism is decided
depending on the user’s risk profile and the behaviour
pattern.
Single factor authentication
Two-factor authentication (2FA)
Multi-factor authentication (MFA)
Adaptive multi-factor authentication (AMFA)
Copyright © 2022 E-Lock. All rights reserved Confidential
- 5. Knowledge factor
● Something the user knows
● Password, pin
Authentication factors
Possession factor
● Something the user has
● Certificate, phone, token,
smart card
Inheritance factor
● Something the user is
● Fingerprint, retina
Copyright © 2022 E-Lock. All rights reserved Confidential
- 6. Adaptive Authentication
E-Lock AdaptAuth
E-Lock AdaptAuth is an AI-powered Adaptive Multi-factor Authentication solution. AdaptAuth uses a combination of real-time
evaluation of contextual factors and statically configured authentication policies to determine the selection and flow of MFA factors
for every individual authentication request.
This is achieved by building a risk profile for every user by analyzing past authentication attempts and behavioral patterns. The extent
of deviation from such patterns invokes additional MFA factors until desired levels of identity assurance are achieved.
Through such intelligent adoption of authentication flows AdaptAuth achieves the right balance between security and user
experience.
Copyright © 2022 E-Lock. All rights reserved Confidential
- 7. E-Lock AdaptAuth Building Blocks
AdaptAuth Authentication Server
Provides essential functionalities of an
authentication server. Manage user identities,
implement basic authentication, 2FA and Single-
Sign On (SSO).
AdaptAuth Multi-factor Authentication
Custom authentication flows based on different
business requirements. Select from multiple ready-
to-use authentication factors beyond basic
authentication.
AdaptAuth Risk Profile
Our AI-powered anomaly detection and classification
mechanism evaluates risk associated with each
authentication attempt based on numerous context
parameters such as IP addresses, geo-locations,
device signatures and user behavior patterns.
AdaptAuth Policy Manager
Configure authentication policies based on
organizational requirements.
AdaptAuth Device Signature
A device registration, identification, remembering
and tracking mechanism to allow safer access from
anywhere both for devices issued by organization
and BYOD.
AdaptAuth Dashboard
Real-time monitoring and reporting of
authentication requests and events.
Copyright © 2022 E-Lock. All rights reserved Confidential
- 8. MFA factors supported by AdaptAuth
Open Web Standards
Copyright © 2022 E-Lock. All rights reserved Confidential
- 9. AdaptAuth Advantage
• Reduced reliance on passwords and other single-factor
authentication methods
• Improved user experience and reduced friction in
authentication flows
• Seamless switching between enterprise apps with Single
Sign-On
• Real-time monitoring and reporting of authentication
events
• Save system admin and IT hours with self-service user
enrollment
• Efficient and cost-effective way to secure enterprise
applications
• Digital Signature Certificate & PKI-based authentication
Conclusion
Authentication technology is ever changing. Businesses have to move beyond passwords and think of authentication as a means
of enhancing the user experience. Authentication methods eliminate the need to remember long and complex passwords. As a
result of enhanced authentication methods and technologies, attackers will not be able to exploit passwords, and a data breach
will be prevented.
Copyright © 2022 E-Lock. All rights reserved Confidential
- 10. THANK YOU!
For more information: Visit- www.adaptauth.com
Or write to info@adaptauth.com
About E-Lock
E-Lock is pioneer in the field of Digital and Electronic signature solutions. E-Lock's PKI-based solutions have made digital
signatures popular in common business applications and web-based transactions. Compliance with the global standards for digital
signatures has allowed E-Lock to serve organizations in more than 30 different countries, spanning several industries, effectively
and efficiently. This has resulted in massive customer base for E-Lock in countries like the US, the UK, Australia, Greece, Spain,
Hong Kong, Peru, Romania, Kuwait, Portugal, South Africa, Singapore, Lithuania, India, Malaysia, and many more.
It has now entered authentication space with a comprehensive solution providing several features such as basic authentication,
Two-factor authentication, Multi-factor authentication, Single Sign-On (SSO) and Adaptive MFA.
Copyright © 2022 E-Lock. All rights reserved Confidential