Advanced Authentication lets you move beyond user name and password to a more secure way to protect your sensitive information. Using multifactor authentication, you can now step your protection up to the next level when fraud or unauthorized access are overriding concerns. And because Advanced Authentication provides secure access with a simple gesture, you now have the speed and convenience not possible with user name and password.
- One Authentication Framework for Everything
Organizations with multiple authentication methods or devices are usually forced to manage and maintain multiple infrastructures. Not only are multiple authentication infrastructures complicated to manage, they are less secure. What you need is a single framework for all of your devices and methods. Having a single framework keeps costs down, and Advanced Authentication scales to any size environment. - Centralized Policy Engine
Advanced Authentication is robust enough to manage large environments with diverse authentication needs, but simple enough for part-time administrators. With Advanced Authentication's policy editor, you can create policies that are specific to users, devices, or locations. The usage of templates and group policies keeps the user interface clean, regardless of the complexity. Delegated administration and tracking of changes keeps policies secure. And because the policy engine in Advanced Authentication is flexible, it crosses all authentication methods, alleviating redundant work and inconsistent authentication. - Multitenancy
Advanced Authentication supports multiple tenants on a single appliance. Multitenancy allows you to use a single instance of Advanced Authentication solution to serve multiple customers with different environments. Tenants have the ability to customize some of the application configuration settings while others remain universal. - Step Up Authentication Beyond Passwords
Your organization may not be ready to make a full transition to multifactor authentication, but instead have a need for a higher level of protection for certain applications. For these sensitive resources, Advanced Authentication lets you tie different authentication types to specific applications or users. All you need to do is to set up authentication policies for users, applications, locations, and so on to the type of authentication that you want to implement. And those users that do not have to enter their own username and password will enjoy secure access that is fast and convenient. - Event Logging
Advanced Authentication lets you define the types of authentication events that are logged for later retrieval. Typical events include both successful and unsuccessful authentication attempts, as well as changes in enrollment or configuration. - High Availability: Redundancy and Load balancing
Advanced Authentication is designed for High Availability providing continuous uninterrupted operations. Application availability, reliability, and performance is ensured with internal server load balancing capabilities. While replication between a primary and secondary locations (over LAN or WAN) ensures data integrity, multiple updated data stores are always available for rapid disaster recovery (DR). - Web Based User Enrollment
Advanced Authentication provides an easy self-explanatory workflow for the end user registration experience. By simplifying the registration of iOS, Android, and Windows Phone devices as well as workstation connected biometrics, card reads, and others, your users will effectively register their devices, your system will easily scale, and your help desk will not be overrun with registration issue calls. - Web Based Administration and Configuration Portal
Administrative and configuration operations are web based. The simple interface provides for network and RADIUS configuration, database connection, configuration of all authenticators, authentication chain design (2FA / MFA) and assignment, roles delegation, and other key operations in one tool. - Help Desk Module
Help Desk module provides the capabilities to ensure a good end-to-end customer experience. This includes un-enrolling and assist in re-enrolling methods, assign tokens (when needed), and assignment of specific user roles. If a user contacts the Help Desk with an authentication issue related to Advance Authentication, your Help Desk Agent will be able to provide the positive customer support experience expected. This builds strong relationships and further support for your efforts.
For a complete list of the new features and enhancements, see What's New in the Advanced Authentication 6.0 Release Notes.
System Requirements
For the most recent information about system requirements, see the Advanced Authentication Administration Guide on the Advanced Authentication Documentation web site.
File Description
For a description about the files you must download for the Advanced Authentication Remote Access Edition , see the following table:
Files to Download |
Size |
advancedauthappliance-hyperv-x86_64-6.0-260.zip |
1.7 GB (1907227457) |
advancedauthappliance-vmware-x86_64-6.0-260.ovf.tar.gz |
1.9 GB (2061945925) |
AdvancedAuthRemoteAccess-Clients-6.0-260.zip |
56.3 MB (59079060) |