About Rublon
Rating: 8 out of 10
IncentivizedUse Cases and Deployment Scope
We use this authentication software to validate the identity when you log in to various pages or programs on the network. It can be used on computers or mobile devices. Additionally, you may receive a push notification before you are allowed to log in. Push notifications allow user authentication by sending a temporary message.
Pros
- It is recommended to introduce authentication software using a phased approach.
- This authentication software can also be used via the risk-based authentication approach.
Cons
- This mechanism certainly allows to protect a work site, but it can be expensive from an application point of view.
- It is unavoidable to precisely verify the user at the launch of the workstation and/or at the connection to its application using the measures of the security policy and also to show that the authentication procedure is correctly applied.
Likelihood to Recommend
The risk of interception or manipulation by hackers is reduced. It manages to be combined with other means of authentication, they allow the developer's software to be completed with the AMF software. The application tests the user's rights and links him to its services and data. The authentication of the interested party is one of the many keys to this process.