CORE
AUTHENTICATE
Agile authentication, authorization and federation flows
Core Authenticate increases the agility and security of modern IT environments by being container-based and seamlessly integrated into CI/CD pipelines. This gives you maximum transparency and control. From Single Sign-On to strong authentication: determine who accesses your applications and create secure connections to external applications and cloud services.
Although the division of large, monolithic applications into smaller components and the increased use of microservices improve functionality and user-friendliness, they also increase the application’s attack surface.
IT departments are faced with the complex task of implementing an access and federation solution that meets the increasing demands for accessibility and availability while ensuring secure user access and a high level of user-friendliness. The challenges include integration into multi-layered IT systems, compliance with strict security standards and data protection regulations, scalability of the solution in line with company growth and careful consideration of costs and benefits.
Core AUTHENTICATE is the central enforcement point for authentication and authorization that enables secure access to applications anytime, anywhere. By integrating various identity directories, such as Office 365, it creates trustworthy environments across organizational boundaries. Companies can flexibly define who and how accesses their applications – from single sign-on to multi-factor authentication (MFA). Seamless compatibility with common deployment and testing tools supports automation, flexibility and resilience.
HIGHLIGHTS
Multifactor authentication
Core Authenticate sets new standards in multi-factor authentication by offering a wide range of pre-integrated tokens and methods that can be flexibly combined for different application scenarios.
Fully integrated transaction protection
Core Authenticate supports a wide range of processes for verifying the integrity and traceability of transactions, for example for e-banking payments.
Increased productivity thanks to single sign-on
Core Authenticate enables a user-friendly and secure single sign-on, where users only have to log in once to gain access to all authorized applications – even if they use several different identity directories.
Seamless integration into CI/CD processes
Containerization and the associated microservices architecture increase the business value of applications by accelerating development cycles and improving scalability.
Unsurpassed versatility and customizability
With its logical system, Core Authenticate offers everything for the implementation of complex authentication processes, depending on business requirements, users and application landscape.
Improved risk management
The definition and implementation of various authentication and authorization controls in combination with Core Authenticate enables efficient and effective risk management, such as Risk-Based Authentication (RBA) in combination with sorbay_RISK SCORE.
FEATURES
- Infrastructure as Code
- Fully customizable presentation layer
- Identity propagation and SSO
- Maps various login flows
- Supports self-services
- AuthConnector LDAP / AD, SMTP, NTLM, Kerberos
- AuthConnector RADIUS (token int., cred. verification, etc)
- AuthConnector HTTP/Rest/SOAP (MobileTAN, cred. verification, etc)
- AuthConnector RSA SecurID (native RSA protocol)
- AuthConnector X.509/PKI
- AuthConnector TOTP (e.g. for Google Authenticator)
- AuthConnector Mobile ID
- AuthConnector ELCARD (native handshake/integration)
- AuthConnector FIDO2
- SAML 2.0 (IdP and SP)
- Open ID Connect (OP and RP)