⬆️ ⬇️

RCNTEC launches third version of auth.as:token for iOS

The third version of auth.as:token for iOS, available for download in the Apple AppStore, embodies a number of new features:



- Added versatility, through which you can generate passwords for several domains at once, without importing account settings each time. Via iCloud, the list of accounts using the second authentication factor can be automatically replicated to all user's iOS devices.



- Improved synchronization of settings and profiles between all devices with a single AppleID (when using the iCloud storage option). No setting and account will not disappear if iCloud is used as storage.

')

- The visualization of the time synchronization process has become even clearer. This minimizes possible problems associated with the generation of passwords over time. For stable work with one-time passwords that are updated 2 times per minute, the smartphone must have a perfectly accurate time. The new version of the application checks the device for accuracy of time every time it starts up, when finished informing the user about the time synchronism.



- The time for scanning and recognizing a QR code with account settings has been reduced, adding new profiles has become even faster and easier.



- Added support for two-factor authentication for Google and Microsoft Office 365 accounts. It is much more convenient to store and use all accounts of the second protection factor in one application.



- The application interface has become more intuitive, a user-friendly intuitive visual separation of user accounts by service provider type has been developed, the stability and responsiveness of the application has been improved.







The auth.as:token mobile app for iOS, which generates one-time passwords, was developed for the AUTH.AS two-factor authentication system.



Reliable, fault-tolerant, horizontally scalable system AUTH.AS protects company data from unauthorized access. When using AUTH.AS, a second authentication factor is added to the user credentials - a variable password. As a result, even if an attacker intercepts his account data, he will not be able to use it, which increases the security of business data tenfold. Penetration into the protected perimeter becomes so time consuming that in most cases it loses any economic sense.

AUTH.AS system is provided as a cloud service or as a box solution and can be installed on the customer’s facilities.



AUTH.AS supports tokens of different types. The basic solution is to use a mobile application for iOS or Android. Many well-known variants of physical tokens from manufacturers such as HID, SafeNet and others can also be used.



Advantages of AUTH.AS:

· Simple and intuitive user interface

· Availability 24/7/365

· Full control over the authentication process of its applications

· No need to store user credentials such as a password on the System side

· The ability to send access logs to the user's infrastructure

· A simple and convenient mobile application for generating one-time passwords (iOS / Android)

· Support for major manufacturers of physical one-time password generators, such as HID and SafeNet

· Convenient API for embedding the Service into the operation of your applications

· Support for integration protocols with external systems such as RADIUS and LDAP.



There is a possibility of convenient, simple migration of users from the old authentication system to the two-factor authentication service AUTH.AS.

Source: https://habr.com/ru/post/281056/



All Articles