Your location:Home>身份验证

LoginTC

Two-Factor Authentication For Every User

Protect your employees, road warrior workforce, remote vendors and temporary contractors with a single cohesive solution. LoginTC adapts to individual workflow constraints and technology realities. From smartphone apps to hardware tokens to desktop solutions, LoginTC supports a broad-range of authentication options to meet all of your business needs.

An Authentication Solution For Every User

LoginTC has an authentication option for all of your users. Prevent Account Takeover by leveraging Two-Factor Authentication with LoginTC.

 LoginTC Push

Get an authentication request directly to your smartphone. Approve with a single click and you’re in. A seamless experience that keeps the right people in and the wrong ones out. Policies allow administrators add contextual information, enforce PIN protection and more.

 LoginTC Desktop

Turn your desktop or laptop into a secure second factor authentication device. The LoginTC Chrome Extension installs directly anywhere Chrome is installed. Get the same experience as smartphone app from the convenience of a computer.

 LoginTC Passcode

The LoginTC app also supports a 6-digit One-Time Password. Don’t have internet to receive a push? No problem. Launch the app and enter the code instead.

 SMS Passcode

Don’t always have a smartphone or internet connection? We’ve got you covered. Send a One-Time Passcode to your phone using SMS. Use the code to get in.

 Email Passcode

Have a large user base and can’t guarantee a certain type of technology of phone? Email is here. Send a One-Time Passcode to your email.

 Phone Call

Support teleworkers without mobile or smartphone access? Not a problem. LoginTC can call any phone number and authentication a user directly from the call.

 Security Keys

LoginTC supports a variety security keys that are U2F and WebAuthn compliant.

 Hardware Token

LoginTC supports OATH compliant Hardware Tokens. You can use your own and we even sell our own branded version.

 Bypass Codes

Need emergency access? Bypass codes are here. An administrator can create a one for users in a pinch. Each Bypass Code has a policy for number of times they can be used and for how long they are valid.

 

Protection For Any Application

LoginTC supports all major Remote Access Providers, Web Access Managers, Outlook Web Access, Cloud services, Remote Desktop and much much more. Anywhere there is a username and password, LoginTC can add an additional layer of security. Our wide-ranging choice of Connectors means you can do more with less. Leverage your existing infrastructure without introducing additional hardware.

 

 

 

Centralized Policies and Management

Manage users and tokens in one easy to use comprehensive cloud-based service. Customize authentication policies, user enrollment, view audit logs and much more with the LoginTC Administration Panel. Actions can even be automated with our Programmatic Development Interface .

 Token Management

Manage all of your second-factor credentials in one place. Administrators can drill down into user smart devices, phones and hardware tokens and perform lifecycle management tasks.

 Policy Management

Pick and choose security policies that make sense for your organization. Each organization can pick from wide-ranging options on how 2FA will be enforced.

 User Lifecycle Management

Create and manage your users with streamlined tools. From Bulk operations to individual entries, pick the level of granularity required for the task. End to end onboarding and offboarding in one place.

 Administrator Roles

From Account Managers to Help Desk, pick the right role for administrators managing your LoginTC organization. The LoginTC Administration Panel adapts its user interface to the role of the administrators signed in.

 User Synchronization

Automatically onboard and off-board 2FA users with our synchronization tool. Leverage your existing Active Directory groups and user management to seamless reflect that state within your 2FA deployment.

 Audit Logs

Review User and Administrator logs at any time. Search by user, time span, actions, administration and keyword filters. View the logs online or download them for reporting.

 

北京哲想软件有限公司