Skip to main content
Skip table of contents

Supported Authentication Factors

My-Access supports all major authentication factors, from password to FIDO2 Authentication for Windows Hello.

Administration

All authentication factors can be monitored by admins (deactivation, reset, etc.).

Customers generally give extended management rights to Helpdesk agents in order to perform various actions regarding authentication factors (reset a password, unlock a device, etc.).

By design, My-Access supports the following authentication methods:

  • Windows transparent authentication (Kerberos)

  • Login/password (using password defined in Memority or customer AD/LDAP Directory)

  • SSL client certificate (smart card or soft certificate)

  • Soft token OTP for enrolled browser and app mobile authentication

  • Push mobile

  • TOTP (Google Authenticator)

  • Radius (server or client)

  • Email OTP

  • SMS OTP

  • WebAuthn (included WindowsHello and Yubikey)

  • Replay login/password

  • Delegation to an external IdP (SAML and OIDC)

  • New authentication mechanisms already deployed within our clients’ Information System can be implemented if they are conforming to market's standards.

Read Next

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.