You need more than just a username and password to authenticate your users. You need to know where they are, what network they’re coming from and what applications they’re accessing. Our platform allows you to enable contextual authentication, and mix and match with other authentication methods to meet your policies so you can:
- Provide step-up authentication for specific resources and contexts.
- Create group and role-specific rules and authentication chains for sensitive data access.
- Collect identity attributes from multiple sources like external identity repositories.