Strong authentication addresses the exponential increase in internet-based fraud over the last few years. The basic user name-password model for authentication is no longer sufficient.
Strong authentication uses two-factor authentication, where an end user is required to provide more than one form of identification. For example, in addition to the typical user name-password (something the user knows), the end user also has to provide an additional hardware or software credential (something the user has).
The Advanced Authentication service provides proprietary software credentials, which can be used as the possession factor (something the user has) for authentication. The end user's password or PIN is used as the knowledge factor (something the user knows). As a result, end users retain the familiar user name-password login process. They need to know only their user name and password or PIN, but are protected by a strong authentication solution that works in the background.
The following strong authentication credential types are available to protect resources in your organization:
These credential types are discussed in detail in later topics.
|
Copyright © 2012 CA.
All rights reserved.
|
|