Authentication

Correct identification of the information system user is crucial for access to the system. In order to prevent identity confusion or identity theft, it is necessary to verify the identity in advance, in other words, to authenticate the user. The authentication itself can be done in various ways, most often by means of a name and password, but this is not a very reliable method because the passwords used are mostly static and easy to remember, which makes it possible to break them by brute force. If we force a complex password complexity by technical means, breaking the password is much more difficult, but also our memory usually has a problem with such a password, so we usually make a note of it somewhere just to be sure, and few people remember to secure these notes, which often end up on the monitor or under the keyboard. 

Multi-factor authentication 

In order to guarantee user identification in spite of the above problems, it is necessary to use a combination of several factors for authentication 

  • knowledge (password, PIN) 
  • thing (token, certificate) 
  • trait (biometrics) 

so called multi-factor authentication, where a combination of some of these factors is needed to verify the identity, such as PIN+TOKEN or certificate+PIN 

Technical support for the use of multi-factor authentication can be a challenge as it requires infrastructure and skilled personnel to implement and operate the system. The solution is to use authentication as a service. 

Authentication as a service 

In this case, the technology for multi-factor authentication is hosted in the cloud by qualified personnel, and the customer uses servers in the cloud to authenticate its users. It does not need to run the authentication system, it is sufficient to define the users in the GUI, assign authenticators, (possibly leaving this task to the provider as well) and configure authentication against the cloud on the internal systems. The cost of the service is proportional to the number of defined users. 

Basic functions 

  • Providing infrastructure for multi-factor authentication 
  • Role-based administrator access to the management interface 
  • Authentication to SaaS applications, inhouse applications, network devices 
  • Choice of authentication form 
  • Reports 
  • Charging for the service 

Advantages of the solution 

  • minimising capital expenditure 
  • saving resources 
  • process automation 
  • scalability and flexibility 
  • high availability 
  • cost reduction 
  • multi-tier and multi-tenant environment 

Price of the solution 

The price depends on the number of assigned authenticators and the way of using the service. We will prepare a quotation according to the specific requirement. 

Our offer 

KOLAS s.r.o. will provide you with this service, create an account and, if you wish, train the staff or manage the account. It will help with the selection of authenticators and their distribution, if necessary, as well as with the reconfiguration of the systems. It will then report and charge you for the use of the service at regular intervals.

sta_headerlogo.png