cidaas Authenticator- Configuration

cidaas Authenticator is a mobile application developed by Widas Concepts that implements two-step verification.

Find the below two-step verification services is implemented using various options such as the listed below:

Cidaas Authenticator Description

Face Recognition

Identity verification using the advanced biometric method, where the user's face is uniquely identified. For more information refer Face Recognition Configuration.

Touch-ID Recognition

Unique characteristics of a person’s voice is used for identity verification. For more information refer Touch-ID Recognition Configuration.

Voice Recognition

Another biometric procedure to verify the identity of a user, that is based on his fingerprint. For more information refer Voice Recognition Configuration

Pattern Recognition

MIdentity verification that needs the user to confirm his chosen pattern, like the commonly used mobile lock-pattern. For more information refer Pattern Recognition Configuration

Smart Push

Technique that uses the Push notification feature of a mobile device and needs the user to choose the right code. For more information refer Smart Push Recognition Configuration

TOTP Verification

TOTP stands for Time-based One-time Password - is a temporary passcode (six or eight digit), generated by an algorithm, used for authenticating users based on time and device. For more information refer TOTP Verification Configuration.

Google Authenticator

cidaas supports the Google Authenticator App, that works on the same principle as cidaas Authenticator App. So, users who already have it can continue using the same. For more information refer Google Authenticator

How it Works

Typically, a user installs the Authenticator app on a smartphone. Login to a site or service that uses two-factor authentication, the user provides user name and password to the site and runs the Authenticator app.

cidaas Authenticator is available as a free download on the Play-Store or App-Store.

The app requests the identification info from the user which is verified with the pre-configured data to authenticate the user’s identity. The identification could be done using any of these methods - TOTP, Pattern Recognition, Face Recognition, Touch-Id Recognition, and Smart Push Notification.

For this to work, a pre-configuration operation must be performed ahead of time: the site provides a shared secret key (QR code) to the user over a secure channel, to be stored in the Authenticator app. This secret key will be used for all future logins to the site.

results matching ""

    No results matching ""