Supported Authentication Factors
My-Access supports all major authentication factors, from password to FIDO2 Authentication for Windows Hello.
Administration
All authentication factors can be monitored by admins (deactivation, reset, etc.).
Customers generally give extended management rights to Helpdesk agents in order to perform various actions regarding authentication factors (reset a password, unlock a device, etc.).
By design, My-Access supports the following authentication methods:
Windows transparent authentication (Kerberos)
Login/password (using password defined in Memority or customer AD/LDAP Directory)
SSL client certificate (smart card or soft certificate)
Soft token OTP for enrolled browser and app mobile authentication
Push mobile
TOTP (Google Authenticator)
Radius (server or client)
Email OTP
SMS OTP
WebAuthn (included WindowsHello and Yubikey)
Replay login/password
Delegation to an external IdP (SAML and OIDC)
New authentication mechanisms already deployed within our clients’ Information System can be implemented if they are conforming to market's standards.