iSecurity MFA
Our solution works in the easiest way possible, iSecurity Multi Factor Authentication inside the IBM i, as part of the user’s initial program, prompting for MFA at sign-on.
No need for multiple login steps — one step is enough.
MFA works with every Authenticator App available in the Market. We use ANY Token generator, such as Google Authenticator on a mobile phone or by any hardware device. Freedom is part of our Multi Factor Authentication.
iSecurity MFA is the easiest system to use on the market. It can be ready for all your company’s IBM i systems to use in less than an hour. You don’t have to rewrite or recode a single module in your software.
Key Features
One MFA authentication covers all of a person’s activity from the same IP range for a specified amount of time. You can specify whether it is requested when the access is from inside or outside that person’s pre-approved ranges of IP addresses.
Some users may have multiple profiles to access different systems. iSecurity MFA introduces the concept of a person rather than based on profiles. When a person is authenticated once (including the IP group), users can access using any of their user profiles.
Other implementations require complex systems and hardware devices to meet the requirements on Multi Factor Authentication. Here at Raz-Lee, we like to keep things simple. Our solution follows a pure IBM environment standard, and can be implemented in one hour.
MFA only uses standard applications on it and on smart phones. There is no need for additional hardware server, another operative system server nor special apps on phones and/or PCs.
One MFA is good enough for all of a Person’s activities, from the same IP, for a specified time. This includes:
- Secure Sign ON
- FTP Server
- REXEC
- FTP Client
- ODBC
- File Server
- Remote PGM/CMD
- DDM/DRDA
Users of Radius, Qauth2, OpenID (PingID) can get authenticated by one of these apps, MFA will continue having these apps in control of the users, eliminating the need for additional authentication.
Based on Clients Experience
Business Vertical: Finance & Banking.
Need: Zero Trust Architecture Implementation for IBM i Focused on Exit Point and User Security.
“Securing the access with Multi Factor Autentication based on the IP of the User its a great way to manage if they need or not to use the featured based on their location, also it can be configured to block access if its on a non secure location, the flexibility for creating rules is for me the best feature, protecting by User, Work schedule, including all protocols like TCP/IP, FTP, Telnet, WSG, Passthrough, etc…”
Request Demo
Please fill the following Form, our Sales Representatives will contact you as soon as possible.