Multi-Factor and Single Sign-On Authentication

Building Blocks

Enrollment, Identity Verification and Ongoing Authentication

So many applications — from physical and logical access to voting, border entry, drug prescription, digital and physical access, and financial transactions — require proof that an individual is exactly who they say they are. For these cases, the simple combination of a user ID and password is no longer enough to protect such vulnerable information. Identity theft, data breaches, malware, malicious actors and regulatory requirements mean that digital security must evolve to stay one step ahead of security threats.

HID Global offers a full line of Radio Frequency Identification (RFID) card readers and digital fingerprint readers to complement your organization’s existing technology infrastructure. From enrollment to identity verification and ongoing authentication, your systems are protected and compliant — now and in the future.

Single Sign-On (SSO)

With SSO, users carry a master sign-on to authenticate themselves for digital or logical access. Once authenticated, whenever they need to log into another piece of software, the technology logs in on their behalf. The SSO solution internally stores the various credentials for every piece of software users need to access and then validates the appropriate credential within those systems. For SSO remote authentication, RFID-enabled single sign-on allows seamless and frictionless switching between applications without logging in again. Our SSO technology allows software vendors and organizations the ability to utilize their current RFID credentials or add biometric security capabilities, which can’t be lost, shared or stolen.

SSO Key Benefits:

  • Eliminates the burden of memorizing multiple passwords for additional applications
  • Increases security by utilizing different passwords for different hardware/systems managed through one SSO software application and accessed via a USB token, soft token or similar encryption device
  • Saves time for the end-user by not requiring them to spend time logging into many different applications
  • Reduces risk by storing credentials for third-party applications internally, rather than on external systems
  • Saves money on IT resources with fewer calls to the service desk for password resets
  • Utilizes your organization’s existing infrastructure — via partnerships with a myriad of software vendors to make integration seamless
  • Supports many technologies and form factors — from cards to wearables — for almost any application

Multi-Factor Authentication (MFA)

MFA uses several different factors to verify a person’s identity and grant them access to various software, systems and data. The security of multi-factor authentication is derived from requiring confirmation of at least two of the following factors — who they are (e.g. biometrics), what they have (e.g. a credential) and what they know (e.g. a password). The combination of a password, physical token and biometric credential can significantly reduce the risk of data and software breaches. Adding an extra layer of authentication — be it from a biometric reader, RFID smart card or mobile device — provides even more security.

MFA Key Benefits:

  • Highest level of data encryption to comply with industry regulations and protect your internal database from security breaches
  • Fast log-in access and optimized operations with the ability to quickly authenticate between multiple users or customize the accessibility of actions depending on a user’s authorization level
  • Strongest performance metrics for capture, liveness and matching
  • Dramatic reduction in the time spent re-establishing identities, creating a more positive and productive work environment while saving labor hours
  • Ability to capture usable biometric data on the first attempt saves time by reducing management oversight and provides an excellent customer experience
  • No vendor lock-in — HID solutions adhere to the highest industry standards and are interoperable with other solutions (including legacy systems), giving customers freedom of choice for future projects
  • Insights, analytics and reporting make it easy to resolve risky situations quickly while meeting compliance requirements
  • Support for many technologies and form factors — from cards to wearables — for almost any application