Authentication.
Assured.

Trusted user onboarding. Robust authentication mechanisms.

Authentication Assurance

It starts with identity.

If you don’t know who’s authenticating, you can’t adequately defend against the risks posed by the current threat environment. Strong authentication must start with a reliable user onboarding process to create the digital identity. This includes:

  • Identity proofing to verify that the person is who they claim to be,
  • Deduplication to ensure the user isn’t already onboarded, and
  • Binding the person’s identity attributes to their biometric data.

Binding a person’s biometrics to the identity attributes collected during onboarding means you can upgrade your current MFA practice to strong authentication with identity assurance.

Authentication levels.

When it comes to securing your workplace, you need assurance that the person being
granted access is who they say they are.

Single-factor authentication

A single basic factor like a password or swipe card is no longer enough to secure any organisation.

Multi-factor authentication

Certain traditional methods of MFA – like hardware tokens or OTPs – can be applied in low-risk environments. But they’re not enough to protect enterprise or government environments because they don’t bind a person’s identity attributes to their biometrics. I.e. they authenticate the token, not the person.

Strong authentication

Strong authentication

The only option for the modern workplace and any protected environment. Strong authentication involves strict identity proofing and binds the biometric credential to relevant identity attributes, for the highest level of assurance that the user is who they say they are.

What sets us apart.

After identity proofing is completed, Daltrey binds the biometric credential to relevant identity
attributes to deliver strong authentication on any device, across any channel.

Single-factor authentication

Relies on something you have OR know:

PIN

Multi-factor authentication

Relies on something you have:

PLUS something you know:

PIN

How do you ensure the integrity of the biometric authentication?

When the first factor is an inherent factor – like a biometric credential – strong authentication also ensures:

  • Robust presentation attack detection
  • A configurable threshold
  • Selection of the right inherent factor for the use case

Let’s talk authentication.