In our latest release of the Covisint Cloud Platform, we have expanded our options for multi-factor authentication with the support for Google Authenticator. Google Authenticator is a popular application optimized for mobile usage that implements two-step verification using a six- to eight-digit one-time password. It facilitates and secures access to business applications provided by Google as well as by third-party providers.
2FA and MFA are critical to increase the level of identity assurance and dramatically reduce the risks of user or device impersonation. Covisint has for long supported other multi-factor options (ID Cipher, SMS, email, phone) and they are increasingly used by business users to protect access to companies’ sensitive data and mission-critical systems. Soft token solutions such as Google Authenticator are specifically praised for their convenience, ease of use and high assurance at low cost.
Administrators can configure Google Authenticator and other MFA options at the realm level. Once enabled, end-users can set up MFA from a user interface where all MFA configuration options are presented. For Google Authenticator, users only need to enter the secret code or scan the QR code required to set up the Google Authenticator app. Once the code/QR code is verified, users can register one or multiple devices and gain full access to authenticated components.
Registered devices can be changed/removed by users later on. To register multiple devices, users shall scan the same Google Authenticator QR code as configured on their default device.
Other Security Enhancements
This release also support the use of multiple security certificates for multiple SAML configurations. This functionality support topologies where a single Active Directory Consumer Services (ADFS) supports multiple environments established in a single Covisint production environment – as is often the case for large, global enterprises.
When considering an IDaaS vendor, it is important to select a solution that will evolve as new authentication technologies and businesses’ needs for scale and security evolve.