It has been proven that the majority of significant data breaches are caused by weak passwords and phishing schemes. Using the Gluu Server, you can configure multi-factor and multi-step authentication to applications and call external API’s such as intrusion detection.
Centralized Authentication Logic
The Gluu Server provides an interface to centrally configure authentication logic for your organization.
Through the use of Jython interception scripts, your organization can easily incorporate complicated logic into the authentication such as location, time of day, and network to not only secure applications, but configure organization wide policies to deliver a more secure user experience for login transactions.
Enable Multiple Solutions
Often times the device and context of the authentication drive the type of strong authentication that is needed. Gluu’s flexible authentication architecture allows your organization to simultaneously implement any of the above solutions, or any solution by request, with correlating policy to implement each mechanism as appropriate for the specified situation.
Pre-Integrated and By Request
Each time a customer asks us to integrate a new two-factor solution we open source the integration code. We currently have scripts for a number of industry leading two-factor solutions and are always working on more. Once your organization determines the strategy for authentication, the Gluu Server can be configured to enforce it.