This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our cookie notice for more information on the cookies we use and how to delete or block them.

Bookmark Email Print page

Strong authentication

User access to systems, applications and data within Identity & Access Management strategy goes beyond basic username and password authentication. Strong authentication leverages appropriate authentication complexity dependent upon the application or service being requested. This can include certification based authentication, smartcards, tokens, biometrics and much more.

A service oriented approach to strong authentication enables services to be granted dependent upon the authentication mechanism used. A username and password authentication may grant a basic level of access whereas a smartcard authentication allows for 2-factor authentication and non-repudiation of the transaction being performed.

Taking a risk based approach to strong authentication requires a risk assessment to understand the additional factors that need to be considered such as the user location, time zone, last authentication time, hardware device and other policy factors.

Our team have deep industry expertise to advise and implement strong authentication solutions to secure our clients’ business boundaries, whilst allowing business operations to continue efficiently.

Back to Identity & Access Management

Share this page

Email this Send to LinkedIn Send to Facebook Tweet this More sharing options
Follow:

Get in touch

More on Deloitte