Reliable identity protection
Head of Network & Security Operations
T: +49 911 9352-1328
You carefully assign users selected privileges – but then, is the person accessing the system really the one he / she pretends to be? Be on the safe side and mitigate identity theft: two-factor authentication (2FA) is used to verify the identity of a user by combining two different, independent components (factors).
The following factors / proofs of identity can be combined:
- Password (LDAP, AD)
- One-Time Password (OTP)
New passwords are required for each access attempt. These are generated by a token via list or calculation, e.g. RSA. It is possible to use hardware tokens or software token (e.g. an app running on a smartphone).
- Biometric data (e.g. fingerprint sensor)
- Optical technologies (e.g. QR code scanner)
The combination and configuration of the factors used in the identification process is done in a customer-specific manner. Our experts will be glad to advise you about the best technology and configuration of two-factor authentication.