Gemalto is now part of the Thales Group, find out more.
Contact Us

Context-Based & Step-Up Authentication Solutions

Context-based Authentication Icon

Thales' context-based authentication offers convenient, frictionless strong authentication while maintaining the flexibility and agility to add protection with stronger methods of security in higher risk situations.

Combined with "step-up" authentication, context-based authentication optimizes a layered approach to access security by assessing user login attributes and matching them against pre-defined security policies. When security policies are met, users are granted immediate access. When security policies are not met, users are asked to step up security by providing an additional authentication factor, eliminating the risk of unauthorized access.

A step up second factor could be a PKI token or a one-time passcode received via SMS text message, or generated on a mobile device or hardware token, depending on organizational policies.

How Step Up Authentication Works

Locked Laptop Icon

Thales' SafeNet Access Management and Authentication Solutions leverage configurable, white-box policy rules to enable granular control over the level of authentication required each time a user logs in to an online resource.

The context engine analyzes a user’s logon attributes based on a set of configurable parameters—including geographical location, IP address, time of day, and device recognition—and generates a context assurance level. If a security policy is met, users are granted access. If a security policy is not met, the user may be asked to step up security by providing an additional authentication factor.

Context-based authentication is currently supported by SafeNet Trusted Access.

Context-Based Authentication Flowchart

SafeNet Trusted Access

SafeNet Trusted Access

SafeNet Trusted Access offers identity-as-a-service, combining the convenience of cloud single sign-on with granular access security. By validating identities, enforcing access policies and applying cloud SSO, organizations can ensure secure, convenient access to numerous cloud applications from one easy-to-navigate console.

Learn More
We’re beginning the switch to broad use of multi-factor authentication as an important new safeguard for our employees and our enterprise. Security attacks are unrelenting, and we view MFA as a vital and necessary addition to VUMC’s enterprise cybersecurity program.
Andrew Hutchinson
Executive Director
of Enterprise Cybersecurity, VUMC


Access Management FAQ - Image

What is cloud access management?

How does it work?

Context-Based & Step-Up Authentication Products

  • SafeNet Trusted Access: SafeNet Trusted Access offers identity-as-a-service, combining the convenience of cloud single sign-on with granular access security. By validating identities, enforcing access policies and applying cloud SSO, organizations can ensure secure, convenient access to numerous cloud applications from one easy-to-navigate console.
  • SafeNet MobilePASS+ Out-of-Band Push Authentication: Offering frictionless strong authentication to hundreds of applications, including SaaS and VPNs, push authentication on mobile devices lets users authenticate with a single tap of a finger on their mobile device.
  • GrIDsure Authentication: GrIDsure Authentication is a convenient pattern-based authentication solution that overcomes the weakness of passwords without the need for software to be installed or hardware to be provisioned.

Context-Based & Step-Up Authentication Resources

MobilePASS+ Product Brief

Offering frictionless strong authentication to hundreds of applications, including SaaS and VPNs, push authentication on mobile devices lets users authenticate with a single tap of a finger on their mobile device.

Download the Product Brief

 

Safenet Trusted Access Product Brief

Safenet Trusted Access offers identity-as-a-service, combining the convenience of cloud single sign-on with granular access security. By validating identities, enforcing access policies and applying cloud SSO, organizations can ensure secure, convenient access to numerous cloud applications from one easy-to-navigate console.

Download the Product Brief
Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.