With the help of geodata, you can enable or disable certain authentication methods and allow or deny a login based on the user's location.
Adapt the authentication process if the user logs in from:
With authentication actions, you can orchestrate what happens after the credentials are verified. The actions can be chained together and dependencies can be set to ensure execution occurs in a configured order. They can look up information in databases, prompt the user for more information, or run other activities to ensure proper authentication and a secure login.
Explore authentication actionsThis authentication method uses a financial-grade design pattern where a mobile app can authenticate users via a separate high-security mobile app. This provides an out-of-the-box Strong Customer Authentication (SCA) solution.
Meet SCA requirements with App2App authenticationThe OpenID Wallet authenticator allows users to authenticate with a verifiable credential. This means that the Curity Identity Server supports both issuance and presentation of verifiable credentials.
Try the Curity Demo Wallet for a first-hand user experience