Various Authentication Methods and Orchestration Templates
Make Security Policies More Intelligent.
Multiple Authentication Methods
Authing provides dynamic tokens, SMS, email,and other secondary authentication methods, catering to various usage scenarios and effectively preventing account theft and data leakage risks.
Flexible Configuration Templates
Authing provides templates such as "Same IP High Frequency Login", "Same User Password Accumulation Error", etc. Enterprises only need to directly configure and customise the parameters to realise MFA policies in complex scenarios.
Dynamically detect user behaviour
After logging in and authenticating, it continuously analyses usage behaviours and automatically configures appropriate security policies, and when a risk event occurs, it quickly pulls up MFA authentication for comprehensive risk prevention.
While Ensuring Authentication Security,
We Also Consider Employee Efficiency and User Experience.
Adaptive security policy
"Adaptive" MFA policy, which can judge the risk based on the user's attributes, location and other data during authentication, and enable secondary authentication only within the risk range.
Calling the API/SDK
Authing provides various MFA APIs. Enterprises can simply create an MFA application in the Authing console and install the Authing SDK on the client/server to quickly expand MFA capabilities.
Pre-integrated multiple terminals
Authing has pre-integrated various terminal applications for MFA authentication scenarios such as ADFS, Radius, and VPN. Enterprises can integrate them directly with Authing without needing to develop their own logic.