Adaptive Authentication for Intelligent Login Decisions
With the help of geodata, you can enable or disable certain authentication methods and allow or deny a login based on the user's location.
Adapt the authentication process if the user logs in from:
- A different location
- A new country
- Multiple locations in short timeframes indicating an Impossible Journey
User Orchestration with Authentication Actions
With authentication actions, you can orchestrate what happens after the credentials are verified. The actions can be chained together and dependencies can be set to ensure execution occurs in a configured order. They can look up information in databases, prompt the user for more information, or run other activities to ensure proper authentication and a secure login.
Explore authentication actionsApp2App Authentication
This authentication method uses a financial-grade design pattern where a mobile app can authenticate users via a separate high-security mobile app. This provides an out-of-the-box Strong Customer Authentication (SCA) solution.
Meet SCA requirements with App2App authenticationOpenID Wallet Authenticator for Verifiable Credentials
The OpenID Wallet authenticator allows users to authenticate with a verifiable credential. This means that the Curity Identity Server supports both issuance and presentation of verifiable credentials.
Try the Curity Demo Wallet for a first-hand user experienceNext steps
Ready to modernize IAM?
Start Today - Build security and improve ease of use to stay ahead of the competition.