Adaptive Multifactor Authentication

Secure, risk-based step-up or step-down multifactor authentication

Adaptive-Multifactor-Authentication 500x450

Safeguard accounts against credential theft and fraud

Complete protection

Safeguard your accounts and resources with empowered contextual multifactor authentication that will protect the right people with an elevated user experience.

Ilantus integrates with AD or LDAP or even homebrewed directories with out-of-the-box connectors to HR systems like SAPHR and Peoplesoft. It also integrates with SaaS and on-prem apps, CSV files, and third-party identity providers.

Risk-based security

Increase or decrease the number of authentication factors required based on the defined policy. Choose from attributes like device, IP, location, time of access, velocity, network, mac address, and more.

Ilantus integrates with AD or LDAP or even homebrewed directories with out-of-the-box connectors to HR systems like SAPHR and Peoplesoft. It also integrates with SaaS and on-premises apps, CSV files, and third-party identity providers.

Leverage the sheer power of synergy

Experience the pure potential of the industry’s only fully capable Converged IAM product. When Access Management and Identity Governance and Administration are combined into a single software, you can employ useful features. These include better authentication when the software steps-up or steps-down authentication (AM) based on the list of entitlements assigned (IGA). The software can also step-up or step-down authentication (AM) based on the age of the last access review performed (IGA), and more.

Convey the best access experience

Improve security, boost productivity, and create Peace of Mind

Reduce friction

Reduce user-friction by prompting for MFA less often. Step-up authentication based on risk and minimize requirements when an access attempt is from the SSO portal, from within your office network, or based on any other attribute.

Eliminate passwords

Password fatigue is an enormous challenge. Opt to go passwordless, leveraging the benefits of adaptive multifactor authentication with alternate factors such as biometrics, hard and soft tokens, and SMS or Email OTPs. Your employees will love you, and your assets will be even safer!

Self-service

Users can enroll or reset MFA factors on their account themselves – saving your organization time and money.

Comply with regulations

Always be compliant, regardless of what authentication assurance levels

Today, all industries require multi-factor authentication compliance. And some regulations even require specific authenticator assurance levels.

Seamlessly meet these regulations by choosing from all kinds of assurance factors.

SN Contextual Data Signal Description
1 Profile Attributes Values of end-user’s profile attributes such as Login ID, Job Title, Department etc
2 Role Memberships List of IAM roles that the user is a member of.
3 IP Address A dynamic value captured during authentication.
4 Geo-Location Dynamic value geo-location of the user.
5 Device Type Windows, Mac, Linux, iOS, Android, etc.
6 Host Name Host name of the user’s device.
7 Domain Name Whether or not the device is linked with the AD domain of the organization (domain-joined machines)
8 Access Channel Type Web or Mobile
9 Network Corporate network, branch office network, outside network, public network (cafes), etc.
10 Device Mac ID Mac Address of the user’s device.
11 Device Certificate The device certificate installed on user’s device
12 User’s Certificate The user’s certificate which is installed on the device
13 User’s IP Risk-score Not only captures the end-user’s IP address, but it also determines its dynamic risk score.
14 Time of Access The time of the authentication attempt.
15 Velocity Actual velocity of the user (from previous location and previous time of access and current location and current time of access)
SN Contextual Data Signal Description
1 Profile Attributes Values of end-user’s profile attributes such as Login ID, Job Title, Department etc
2 Role Memberships List of IAM roles that the user is a member of.
3 IP Address A dynamic value captured during authentication.
4 Geo-Location Dynamic value geo-location of the user.
5 Device Type Windows, Mac, Linux, iOS, Android, etc.
6 Host Name Host name of the user’s device.
7 Domain Name Whether or not the device is linked with the AD domain of the organization (domain-joined machines)
8 Access Channel Type Web or Mobile
9 Network Corporate network, branch office network, outside network, public network (cafes), etc.
10 Device Mac ID Mac Address of the user’s device.
11 Device Certificate The device certificate installed on user’s device
12 User’s Certificate The user’s certificate which is installed on the device
13 User’s IP Risk-score Not only captures the end-user’s IP address, but it also determines its dynamic risk score.
14 Time of Access The time of the authentication attempt.
15 Velocity Actual velocity of the user (from previous location and previous time of access and current location and current time of access)