Strengthening Authentication without Sacrificing User Experience
Two-factor authentication (2FA) – the need of two methods of authentication factors to verify user’s identity. 2FA aims to strengthen user’s access security, preventing attackers from exploiting weak login credentials with the introduction of an additional authentication factor. These factors can include:
- Something you know – e.g. password, PINs
- Something you have – e.g. smartphone, OTP token
- Something you are – e.g. fingerprint, biometrics
How 2FA works?



i-Sprint Two-Factor Authentication Solution



Seamless Integration
The pre-integrated and tested solution allows the i-Sprint 2FA solution to be deployed rapidly across applications and systems. Moreover, the solution supports various brands of OTP tokens and common applications.



Contextual Access Policies
Create context-based access policies that assess risk factors, such as device, network, or location to determine the appropriate access decision required. E.g. prompt for 2FA/ MFA for middle or high-risk requests.



Ensure Compliance and Provide Detail Audit Trail Information
Provides user administration, authentication, authorization and audit services (4As) to address security and compliance requirements.



Multiple Authentication and Transaction Authorization Options
Includes: synchronous option with one-time password challenge, an asynchronous option with challenge and response codes, the re-authentication challenge for critical transactions and inclusion of additional static password.
*i-Sprint 2FA solution allows integration with SingPass/ CorpPass (SPCP) using SAML 2.0 protocol. It also supports Assurity OneKey Token using the Singapore Technical Reference TR-29 protocol.