Multi-Factor and Single Sign-On Authentication

Building Blocks

Enrollment, Identity Verification and Ongoing Authentication

So many applications, from physical and logical access to voting, border entry, drug prescription, digital and physical access, financial transactions and more, require proof that an individual is exactly who they say they are. For these cases, the simple combination of a user ID and password is no longer good enough to protect our most vulnerable information. Identity theft, data breaches, malware, malicious actors and regulatory requirements mean that digital security must evolve to stay one step ahead of security threats.

HID Global offers a full line of RFID card readers and digital fingerprint readers to complement your existing technology infrastructure. From enrollment to identity verification and ongoing authentication, your systems are protected and compliant — now and in the future.

Single Sign-On (SSO)

With SSO, users carry a master sign-on to authenticate themselves for digital or logical access. Whenever they need to log into another piece of software, the technology logs in on their behalf. The SSO solution internally stores the various credentials for every piece of software users need to access and then validates the users within those systems. For SSO remote authentication, RFID for single sign-on allows seamless and frictionless switching between applications without logging in again. Our technology allows software vendors and organizations the ability to increase secure authentication utilizing their current RFID credentials or with biometric capabilities, which can’t be lost, shared or stolen.

Key Benefits:

  • Eliminates the burden of memorizing multiple passwords for additional applications
  • Increases security by utilizing different passwords for different hardware/systems managed through one SSO software application and accessed via a USB token, soft token or similar encryption device
  • Saves time for the end-user by not requiring them to spend time logging into many different applications
  • Reduces risk by storing credentials for third-party applications internally, rather than on external systems
  • Saves money on IT resources with fewer calls to the service desk for password resets
  • Utilizes your existing infrastructure — partnerships with a myriad of software vendors makes integration seamless
  • Supports many technologies and form factors — from cards to wearables — for almost any application

Multi-Factor Authentication (MFA)

MFA uses several different factors to verify a person’s identity and grant access to various software, systems and data. The benefit of MFA authentication is that it requires at least two credentials — who you are (biometrics), what you have (a credential) and what you know (a password) — and is very secure. The combination of a password, physical token, and biometric credential can significantly reduce the risk of data and software breaches. For this extra layer of authentication, whether it be a biometric reader or RFID smart card or mobile device, you can benefit from more secure MFA.

Key Benefits:

  • Highest level of data encryption to comply with industry regulations and protect your internal database from breaches
  • Fast login-access and optimized operations with the ability to quickly authenticate between multiple users and custom accessibility of actions depending on the user’s authorization level
  • Strongest performance metrics for capture, liveness, and matching
  • Dramatic reduction in the time spent re-establishing identities, creating a more positive and productive work environment while saving labor hours
  • Ability to capture useable biometric data on the first attempt saves time by reducing management oversight and providing an excellent customer experience
  • No vendor lock-in — HID solutions adhere to the highest industry standards and are interoperable with other solutions (including legacy systems), giving customers freedom of choice for future purchases
  • Insights, analytics, and reporting make it easy to resolve risky situations quickly while meeting compliance requirements
  • Support for many technologies and form factors — from cards to wearables — for almost any application