It has been proven that the majority of significant data breaches are caused by weak passwords and phishing schemes. Using the Gluu Server, you can configure multi-factor and multi-step authentication to applications and call external API’s such as intrusion detection.
Centralized Authentication Logic
The Gluu Server provides an interface to centrally configure authentication logic for your organization.
Through the use of Jython interception scripts, your organization can easily incorporate complicated logic into the authentication such as location, time of day, and network to not only secure applications, but configure organization wide policies to deliver a more secure user experience for login transactions.
FIDO U2F Out-of-the-Box
All deployments of the the Gluu Server include support for the FIDO Universal Second Factor (“U2F”) strong authentication protocol. In our humble (but accurate) opinion, U2F is the most secure form of authentication available today. U2F uses public/private key encryption and, due to its real-time challenge-response scheme, secures you against vulnerabilities like phishing and man-in-the-middle (MITM) attacks that are present in other forms of strong authentication, like OTP.
Enable Multiple Solutions
Often times the device and context of the authentication drive the type of strong authentication that is needed. Gluu’s flexible authentication architecture allows your organization to simultaneously implement any of the above solutions, or any solution by request, with correlating policy to implement each mechanism as appropriate for the specified situation.
Pre-Integrated and By Request
The Gluu Server supports a number of authentication mechanisms out-of-the-box, including FIDO U2F, Google Authenticator, certificate authentication and more. Once your organization determines its preferred strategy for authentication, the Gluu Server can be configured to enforce it.