Categories: MFA

Adaptive Authentication for more efficient MFA security

Adaptive authentication, method for enforcing the right authentication factors depending on users profile and tendencies. It acts to balance the level of trust against risk.

Adaptive authentication is the way that two factor authentication or multi factor authentication can be configured or deployed.

A multi-factor authentication function can either be set to run at every single login, or to be triggered only in cases where the authentication risk of a login attempt is identified as being suspicious or high-risk.

The latter case is referred to as Adaptive Authentication, and there are several types of events that can trigger this.

Environment-based Authentication

This occurs when users are authenticated based on environmental factors such as geographic location. The probability of the user being legitimate is checked by using the device location, identifying unlikely travel routines, and blocking users in blacklisted locations.

Device-based Authentication

When the levels of security used for authentication dynamically change based on the properties of the device being used to request for authentication, device-based authentication is performed.

Attribute-based Authentication

Attribute-based authentication occurs when attributes assigned to users are used to authenticate users in different levels. Users can be grouped into separate user stores and different authentication schemes can be implemented for each user store. Other common attributes that are considered for authentication include user age, user type, and user roles.

Behavior-based Authentication

There are 2 ways to perform behavior based authentication – through user behavior and the use of geo-velocity.

Risk-based Authentication

Risk-based authentication is used when users are granted access based on a risk score calculated for a certain series of events. Various factors are considered by the risk calculating algorithm, such as the size of the user base, sensitivity of the resources requested, criticality of the system, geolocation, IP addresses, and the status of firewalls and anti-virus software of the device.

Through the use of adaptive authentication methods, the power of MFA can be harnessed in a highly effective manner, maximizing security while avoiding unnecessarily delayed logins.

Akku, the identity and access management solution by CloudNow delivers a powerful multi-factor authentication function to keep your data and applications secure. Contact us for more information today!

Control your Cloud!

Join our mailing list to know how you can control your cloud better.

You have Successfully Subscribed!

Share
Published by
Bhaskar RV

Recent Posts

The AI Revolution: Transforming Cybersecurity

Author: Dinesh Reading Time: 3 mins In the past few months, it seems that any…

9 months ago

Blockchain Technology: A new chapter in Identity & Access Management

Author: Baskar Reading time: 3 mins Why do you need an IAM? These tools help…

10 months ago

Passwordless Authentication: Why you need it, how it works, and how Akku takes it further

  How do you strengthen your identity verification processes? Most organizations go the route of…

10 months ago

Contact us

10 months ago

Security isn’t a one-time investment: 3 key areas where most organizations fail

Your management team says that the time has come to invest in your organization’s cybersecurity.…

1 year ago