- Print
- DarkLight
- PDF
Invisible App Authentication
Article summary
Did you find this summary helpful?
Thank you for your feedback
The platform provides the ability to rigorously verify user identities on a global or channel-by-channel basis and automatically accounts for channel-specific authorization and authentication nuances. Combine authentication methods (SSO Tokenization, 2FA, MFA) to create a layered defense system that protects your enterprise and users.
Two Factor Authentication (2FA)
Every click of the IA link will initiate a generated code to be sent to the primary target ID and the same code will be expected to be entered by the user via the IA medium. The primary target ID is the destination ID to which the IA link was originally sent.
Was this article helpful?