A wide range of traditional authenticators

Entrust supports the widest range of authenticators--from hardware tokens to mobile push OTPs--to align with your needs and simplify your transition from basic to high-assurance authentication. This breadth of offering helps you adapt quickly to new technologies and evolving business processes.

Key considerations when choosing

Do you want authentication to be transparent to the user? Would you like the user to carry a physical device or authenticate online? Do you want the website to authenticate itself to the user as well? How sensitive is the information you are protecting and what is the associated risk? Is physical access (link) to offices, labs or other areas part of your user requirement? Entrust can help you explore the full range of authenticators and determine the best choice for each of your use cases.

Exploring the Options

    Transparent Authentication

    Transparent authenticators validate users without requiring day-to-day involvement.

    Digital certificates

    Our authentication solutions can leverage existing X.509 digital certificates issued from an Entrust managed digital certificate service or a third-party service to authenticate users. Certificates can be stored locally or on secure devices, such as smart cards and USB tokens.

    IP-Geolocation

    Authenticated users can register locations where they frequently access a corporate network or other key assets. Our solution compares current location data — country, region, city, ISP, latitude and longitude — to registered location data. You can then step up authentication when values don’t match. Other features include the ability to create blacklists of regions, countries or IPs based on fraud histories.

    Device Authentication

    You can create an encrypted profile after an authenticated user registers a frequently used computer or device. During subsequent authentication, our authentication software creates a new profile and compares it to the stored value. Step-up authentication is required only when the values don’t match.

    Physical Form Factor Authentication

    Physical form factors are tangible devices that users carry and use when authenticating.

    One-Time Passcode Tokens

    We offer two versions of the popular one-time-passcode (OTP) token. Our mini-token option is OATH-compliant and generates a secure eight-digit passcode at the press of a button. An OATH-compliant Pocket Token offers additional features, including PIN unlock prior to generating the passcode, in addition to a challenge-response mode.

    Display Card

    This authentication option provides the same functionality as the popular token in a credit card format. In addition to providing an OATH-compliant, one-time passcode, a display card includes a magnetic stripe and can optionally include a PKI or EMV chip for greater versatility.

    Grid Authentication

    Our patented grid card is a credit card-sized authenticator consisting of numbers and characters in a row-column format. Upon login, users are presented with a coordinate challenge and must respond with the information in the corresponding cells on their cards.

    One-Time Passcode List

    End-users are provisioned with a list of randomly generated passcodes or transaction numbers (TANs) that are typically printed on a sheet of paper and distributed to end-users. Each passcode is used just once.

    Biometrics

    Entrust leverages biometric fingerprint data to provide an effective balance between authentication strength and user convenience for Microsoft® Windows® login. To protect user privacy, fingerprint data is stored in a database or on an Entrust smartcard as an encrypted mathematical representation — sometimes known as a hash — and compared to the actual fingerprint provided at the time of authentication.

    Non-Physical Form Factor Authentication

    Non-physical form factor authentication provides methods of verifying user identities without requiring them to carry an additional physical device.

    Knowledge-based Authentication

    Knowledge-based authentication challenges users to provide information an attacker is unlikely to possess. Questions presented to the user at the time of login are based on information that was supplied by the user at registration or based on previous transactions or relationships.

    Out-of-Band Authentication

    This method leverages an independent and pre-existing means to communicate with the user to protect against attacks that have compromised the primary channel. Our solutions support this capability by allowing the generation of one-time confirmation numbers that can be transmitted along with a transaction summary to the user. This can be done directly via email or SMS, or sent through voice to a registered phone number.

    Entrust Identity Enterprise Mobile

    Whether for consumer, government or enterprise environments, Entrust Identity Enterprise provides mobile security capabilities via distinct solution areas — mobile authentication, transaction verification, mobile smart credentials, and transparent authentication technology with an advanced software development kit. Supporting the use of the OATH standard for time-based OTP, as well as out-of-band transaction signatures, Entrust Identity Enterprise Mobile is one of the most convenient, easy to use and secure mobile authentication methods available today.

    Mobile Smart Credentials

    Eliminate the need for physical smart cards by transforming mobile devices into mobile credentials for enterprise-grade authentication. Advanced mobile smart credentials can be used with Bluetooth and near-field communication (NFC) technology for greater convenience and secure connectivity.

    SMS Soft Tokens

    SMS soft tokens enable the transmission of a configurable number of one-time passcodes (OTP) to a mobile device for use during authentication. Automatically replenished as needed, this dynamic soft-token approach delivers the strength of out-of-band authentication without the concern for constant network availability, delivery timing or software deployment to a mobile device.

    Request a demo today

    An Entrust Identity portfolio specialist will be in touch with options soon.

    Identity Portfolio

    Our identity portfolio capabilities:

    The identity portfolio suited to your authentication needs

    • Consumer
    • Workforce
    • Citizen

    Consumer

    Workforce

    Citizen