Solutions
Microauthorizations

Strengthen your authentication security with Secfense microauthorizations. Protect access on every stage of the user journey with forced authentication by either the user or the supervisor.

Microauthorizations - one step closer
into Zero Trust and Passwordless Future

schema

Modify your Authentication/Authorization Rules for Every Stage of the User Journey

Microauthorizations from Secfense make it possible to force users to authenticate again every time they access specific resources or want to perform specific actions within the protected application.

If microauthorizations are in place, Secfense takes over the communication and triggers one of two scenarios. In the Owner scenario, Secfense asks the user to reauthenticate. In the Supervisor scenario, Secfense sends the authorization request to a third party.

Two-factor authentication is one of the best ways to protect against phishing; however, its implementation has always been difficult. Secfense helped us solve the implementation problem. We were able to introduce various 2FA methods at once on our web applications.

Dariusz Pitala Head of IT, MPEC S.A.

quote
invisible

Invisible Security Layer

Since User Access Security Broker from Secfense works as an invisible security layer, microauthorizations can be added and triggered at any stage of the user journey.

Microauthorizations in the Owner scenario

In the Owner scenario, microauthorizations operate according to the principle of least privilege. This means they provide additional protection against attacks on an active session or other attacks against an already logged-in user (including real-time phishing or malware).

Microauthorizations in the Supervisor scenario

In the Supervisor scenario, microauthorization requests are sent to selected and trusted users who then decide whether to accept or deny them. This scenario is used to protect particularly sensitive resources.

invisible

Effortless Triggering And Use Of Microauthorizations

Microauthorizations are effective only if they do not require much effort from the user. That is why the recommended microauthorizations setup includes FIDO2 – the open web authentication standard.

With microauthorizations in the FIDO2 standard and the Owner scenario active, users can access protected resources by simply touching the cryptographic key or another local authenticator (for example, a smartphone with a fingerprint sensor or a laptop with an infrared camera).

The supervisor scenario also adds an extra authentication step. In this case, however, access can only be granted by a privileged user with higher authority.

All events related to microauthorizations are logged in the Secfense event log (or streamed to an external login system) and can be analyzed to detect anomalies.

Want to test out User Access Security Broker on your Testing Environment?

Testing enterprise solutions has never been easier. You can deploy and test a UASB demo within one day and learn all its mechanisms. Schedule your discovery call and learn how to register for your commitment-free demo.

Schedule Discovery Call

Testimonials

“Two-factor authentication is known to be one of the best ways to protect against phishing; however, its implementation has always been difficult. Secfense helped us solve that problem. With their security broker, we were able to introduce various 2FA methods on our web applications at once.”

Dariusz Pitala

Head of IT

MPEC S.A.

„We are faced with new challenges every day. We must always be one step ahead of the attackers and know what they are going to do before they do it. We are convinced that User Access Security Broker will bring security to a new level, both for those working at the office and from home. For us, working with Secfense is an opportunity to exchange experience with developers who put great value on out-of-the-box thinking.”

Krzysztof Słotwiński

Business Continuity and Computer Security Officer

BNP Paribas Bank Polska

Cookies allow us to improve your experience on this website and to present relevant content and advertising. By using this website, you consent to the use of the cookies. Find out more by reading our privacy policy.