Two-Factor Authentication For Every User
Protect your employees, road warrior workforce, remote vendors and temporary contractors with a single cohesive solution. LoginTC adapts to individual workflow constraints and technology realities. From smartphone apps to hardware tokens to desktop solutions, LoginTC supports a broad-range of authentication options to meet all of your business needs.
LoginTC has an authentication option for all of your users. Prevent Account Takeover by leveraging Two-Factor Authentication with LoginTC.
Get an authentication request directly to your smartphone. Approve with a single click and you’re in. A seamless experience that keeps the right people in and the wrong ones out. Policies allow administrators add contextual information, enforce PIN protection and more.
Turn your desktop or laptop into a secure second factor authentication device. The LoginTC Chrome Extension installs directly anywhere Chrome is installed. Get the same experience as smartphone app from the convenience of a computer.
The LoginTC app also supports a 6-digit One-Time Password. Don’t have internet to receive a push? No problem. Launch the app and enter the code instead.
Don’t always have a smartphone or internet connection? We’ve got you covered. Send a One-Time Passcode to your phone using SMS. Use the code to get in.
Have a large user base and can’t guarantee a certain type of technology of phone? Email is here. Send a One-Time Passcode to your email.
Support teleworkers without mobile or smartphone access? Not a problem. LoginTC can call any phone number and authentication a user directly from the call.
LoginTC supports a variety security keys that are U2F and WebAuthn compliant.
LoginTC supports OATH compliant Hardware Tokens. You can use your own and we even sell our own branded version.
Need emergency access? Bypass codes are here. An administrator can create a one for users in a pinch. Each Bypass Code has a policy for number of times they can be used and for how long they are valid.
LoginTC supports all major Remote Access Providers, Web Access Managers, Outlook Web Access, Cloud services, Remote Desktop and much much more. Anywhere there is a username and password, LoginTC can add an additional layer of security. Our wide-ranging choice of Connectors means you can do more with less. Leverage your existing infrastructure without introducing additional hardware.
Manage users and tokens in one easy to use comprehensive cloud-based service. Customize authentication policies, user enrollment, view audit logs and much more with the LoginTC Administration Panel. Actions can even be automated with our Programmatic Development Interface .
Manage all of your second-factor credentials in one place. Administrators can drill down into user smart devices, phones and hardware tokens and perform lifecycle management tasks.
Pick and choose security policies that make sense for your organization. Each organization can pick from wide-ranging options on how 2FA will be enforced.
Create and manage your users with streamlined tools. From Bulk operations to individual entries, pick the level of granularity required for the task. End to end onboarding and offboarding in one place.
From Account Managers to Help Desk, pick the right role for administrators managing your LoginTC organization. The LoginTC Administration Panel adapts its user interface to the role of the administrators signed in.
Automatically onboard and off-board 2FA users with our synchronization tool. Leverage your existing Active Directory groups and user management to seamless reflect that state within your 2FA deployment.
Review User and Administrator logs at any time. Search by user, time span, actions, administration and keyword filters. View the logs online or download them for reporting.