Multifactor Authentication AaaS Authentication as a Service

Authentication Overview

3Si Authenticator is a cloud based multifactor authentication solution that protects everything. The service is tailored to suit SOHO, SMB, Large and Enterprise business models.

The subscription model is on a ‘Per-user’ basis and can be consumed as:

  1. Software Based Authentication
  2. Hardware Based Authentication

Authentication Methods

Software Authenticator

3Si software authenticator solutions combines the security of proven multi-factor strong authentication with the convenience, simplicity, and ease of use of OTPs generated on personal mobile devices or PCs. By turning a mobile device into a multi-factor authentication device, organisations save significantly on hardware and deployment costs, while users benefit by not having to carry an additional hardware token around with them.

Compatible with the broadest range of devices and mobile clients, providing powerful identity protection and convenient access control for remote access systems, such as VPNs, Citrix applications, Cloud applications, Outlook Web Access, and Web portals. It also offers strong authentication for secure local network access.

Automated provisioning and activation with zero wait, web-based cloud self-service portals offer 24x7 support for users, further reducing helpdesk calls and overall TCO which in turn increases user satisfaction. Policy-based activation determines the token configuration hence significantly reducing deployment complexities, IT administration overhead, and costs when implementing strong authentication for thousands of users.

Optimized Security with sophisticated security capabilities, including standards-based activation and dynamic seeding, allow organizations to optimize the balance between ease-of-use and TCO without compromising on security.

Token Delivery Methods
  • Software token generation
  • Token delivered via SMS
  • Token delivered via Email

Hardware Authenticator

3Si hardware authenticator is a compact and portable strong authentication device that allows organizations to conveniently and effectively establish OTP-based secure access to network resources, SaaS cloud applications and online services.

Our cloud based self-provisioning portal provides complete token management with real-time hardware activation to user mapping and token re-assignment. This in turn provides a reduced time to market, prevents synchronisation issues and increases user satisfaction.

Token Specifications
  • OTP security algorithm: OATH compliant (based on HMAC-SHA1, OATH TOTP)
  • Operating temperature: 0 C to 70 C (32 F to 158 F)
  • Storage temperature: -40 C to 85 C (-40 F to 185 F)
  • Humidity rating: 0-100% without condensation
  • Battery lifetime: 7 years with up to 10 OTP clicks/day Event-based); 5 years with up to 10 OTP clicks actions per day (Time-sync)
  • Casing: Hard molded plastic

Supported Devices for software token generation:

iPhone, BlackBerry, Windows Phone 7, Windows Mobile, Java 2ME, Android, PC: Windows, Mac OS.