Axioms

Authentication

Authenticate your end-users using a range of strong yet frictionless authentication methods
Authentication Factors
Use multiple authentication factors to create a robust and secure authentication strategy
Knowledge Factors
Authenticate with something the user and only the user knows such as password, personal info, etc.
Possession Factors
Authenticate with something the user and only the user possesses such as mobile, authenticator, etc.
Inherence Factors
Authenticate with something the user and only the user is such as user biometrics, fingerprint, face, etc.
Authentication Intelligence
Everyday we work hard to make life of our clients better and happier
Password Policy
Set password policy as a function of password length, complexity, and entropy. Increase password complexity by requiring a password with case-sensitive, alphanumeric and special characters.
Breach Detection
Further, safeguard user credentials by utilizing password dictionaries, breached password database lookups, personal information to disallow compromised or easily guessable credentials.
Anomaly Detection
Track failed authentication attempts and detect anomalies using various data points such as geo-location, IP address, browser fingerprint and trigger desirable actions like temporary account block.
Authorize your end-users to access protected resource or functionality using OAuth 2 & OpenID Connect compliant grant flows.