Strong Identification Methods

We allow IT teams to specify what end users can do once they are authenticated to perform self-service tasks.

Home Office
Deloitte
KPMG
Investec
SEB
moodys
Fujitsu
Clifford Chance
NHS
Fair Trade
West Yorkshire
Pfizer
hmsa
Mets

Multifactor Authentication for Stronger Identity Management.

A critical factor when considering any kind of self service or password management solution is identity management – namely, ensuring you’re securely identifying and authenticating the users prior to allowing them to carry out respective actions. This solution will also allow IT teams to granularly specify what the user can do once they are authenticated.

Challenge Response Method.

Lepide Active Directory Self Service question and answer method takes the employee through the user verification process by requesting the user to answers a series of pre-defined questions both administrator and user defined, if the verification fails, the employee will be locked out and prevented from taking any further steps. The IT team decides how many questions employees are required prior to authentication and can also create, edit and delete any existing questions at any point. They can also make it mandatory for the users to answer predefined questions. Listed below are the fields that the administrator can configure:

  • Number of Predefined Questions
  • Number of User Defined Questions
  • Number of characters in a User Defined Question
  • Number of characters in an Answer
Challenge Response Method - screenshot

One Time Password (OTP) Method.

The second authentication method the administrator can opt to enable is OTP. Using this method the users are forced to authenticate by entering a unique code provided to pre-authorized users in real time either by SMS or email. Administrators can also customize the message provided through the authentication SMS or email as needed.

One Time Password (OTP) Method - screenshot

Use Either Method or Both in Combination.

IT teams can specify for their users to authenticate using either challenge response validation where the users are posed with questions and answers and / or they can enable OTP validation.

Use Either Method or Both in Combination - screenshot

Featured resource.

Popular Cyber Attack Methods and How to Mitigate Them.

In this whitepaper, we will explore some of the most common attack methods and provide advice on how to mitigate them.

Get the free guide now!
Resource Thumb

1,000 + customers in over 120 countries are using Lepide

Lepide Software Start Free Trial Book a demo Request a Quote