Authentication Methods
A wide range of traditional authenticators
Entrust supports the widest range of authenticators—from hardware tokens to mobile push OTPs—to align with your needs and simplify your transition from basic to high-assurance authentication. This breadth of offering helps you adapt quickly to new technologies and evolving business processes.
Key considerations when choosing
Do you want authentication to be transparent to the user? Would you like the user to carry a physical device or authenticate online? Do you want the website to authenticate itself to the user as well? How sensitive is the information you are protecting and what is the associated risk? Is physical access (link) to offices, labs or other areas part of your user requirement? Entrust can help you explore the full range of authenticators and determine the best choice for each of your use cases.
Exploring the Options
- Click to select...
Transparent Authentication
Transparent authenticators validate users without requiring day-to-day involvement.
Digital Certificates
Our authentication solutions can leverage existing X.509 digital certificates issued from an Entrust managed digital certificate service or a third-party service to authenticate users. Certificates can be stored locally or on secure devices, such as smart cards and USB tokens.
IP-Geolocation
Authenticated users can register locations where they frequently access a corporate network or other key assets. Our solution compares current location data — country, region, city, ISP, latitude and longitude — to registered location data. You can then step up authentication when values don’t match. Other features include the ability to create blacklists of regions, countries or IPs based on fraud histories.
Device Authentication
You can create an encrypted profile after an authenticated user registers a frequently used computer or device. During subsequent authentication, our authentication software creates a new profile and compares it to the stored value. Step-up authentication is required only when the values don’t match.
Physical Form Factor Authentication
Physical form factors are tangible devices that users carry and use when authenticating.
One-Time Passcode Tokens
We offer two versions of the popular one-time-passcode (OTP) token. Our mini-token option is OATH-compliant and generates a secure eight-digit passcode at the press of a button. An OATH-compliant Pocket Token offers additional features, including PIN unlock prior to generating the passcode, in addition to a challenge-response mode.
Display Card
This authentication option provides the same functionality as the popular token in a credit card format. In addition to providing an OATH-compliant, one-time passcode, a display card includes a magnetic stripe and can optionally include a PKI or EMV chip for greater versatility.
Grid Authentication
Our patented grid card is a credit card-sized authenticator consisting of numbers and characters in a row-column format. Upon login, users are presented with a coordinate challenge and must respond with the information in the corresponding cells on their cards.
One-Time Passcode List
End-users are provisioned with a list of randomly generated passcodes or transaction numbers (TANs) that are typically printed on a sheet of paper and distributed to end-users. Each passcode is used just once.
Biometrics
Entrust leverages biometric fingerprint data to provide an effective balance between authentication strength and user convenience for Microsoft® Windows® login. To protect user privacy, fingerprint data is stored in a database or on an Entrust smartcard as an encrypted mathematical representation — sometimes known as a hash — and compared to the actual fingerprint provided at the time of authentication.
Non-Physical Form Factor Authentication
Non-physical form factor authentication provides methods of verifying user identities without requiring them to carry an additional physical device.
Knowledge-Based Authentication
Knowledge-based authentication challenges users to provide information an attacker is unlikely to possess. Questions presented to the user at the time of login are based on information that was supplied by the user at registration or based on previous transactions or relationships.
Out-of-Band Authentication
This method leverages an independent and pre-existing means to communicate with the user to protect against attacks that have compromised the primary channel. Our solutions support this capability by allowing the generation of one-time confirmation numbers that can be transmitted along with a transaction summary to the user. This can be done directly via email or SMS, or sent through voice to a registered phone number.
Entrust Identity Enterprise Mobile
Whether for consumer, government or enterprise environments, Entrust Identity Enterprise provides mobile security capabilities via distinct solution areas — mobile authentication, transaction verification, mobile smart credentials, and transparent authentication technology with an advanced software development kit. Supporting the use of the OATH standard for time-based OTP, as well as out-of-band transaction signatures, Entrust Identity Enterprise Mobile is one of the most convenient, easy to use and secure mobile authentication methods available today.
Mobile Smart Credentials
Eliminate the need for physical smart cards by transforming mobile devices into mobile credentials for enterprise-grade authentication. Advanced mobile smart credentials can be used with Bluetooth and near-field communication (NFC) technology for greater convenience and secure connectivity.
SMS Soft Tokens
SMS soft tokens enable the transmission of a configurable number of one-time passcodes (OTP) to a mobile device for use during authentication. Automatically replenished as needed, this dynamic soft-token approach delivers the strength of out-of-band authentication without the concern for constant network availability, delivery timing or software deployment to a mobile device.
Identity Portfolio
High assurance cloud-based workforce and consumer authentication. Credential-based access including passwordless authentication with unified SSO.
High assurance workforce and consumer authentication. Credential-based authentication including physical smart card issuance. On-premises solution.
Best-in-class MFA and VPN protection for Windows-based workforces.
Our identity portfolio capabilities:
Authenticate
Authorize
Transact and Manage
The identity portfolio suited to your authentication needs
- Consumer
- Workforce
- Citizen
Consumer
Attract and retain customers with best-in-class mobile and online banking services.
Give customers frictionless access to your portals—and build a great brand experience.
Our portfolio integrates seamlessly with your Customer Identity Access Management (CIAM) strategies.
We have the trusted identity tools you need to help you be successful and in compliance.
Workforce
Our portfolio offers the necessary technologies to integrate physical and logical secure access.
Empower workers everywhere with always-on access to VPNs and SaaS applications.
Protect the critical application credentials of system administrators or senior leaders.
Get a true passwordless SSO solution that supports all devices, PCs and Macs, and cloud and on-premises apps.
Our solutions ensure application security for contractors using on-prem or cloud apps.
Remove complexity and enable highly secure mobility with proven PIV solutions.
Citizen
Use our portfolio to secure and manage passports, national ID's and driver's licenses.