{"id":1419,"date":"2023-10-10T09:00:01","date_gmt":"2023-10-10T07:00:01","guid":{"rendered":"https:\/\/memority.p2.pp-izhak.fr\/2023\/10\/10\/un-seul-tenant-plusieurs-moyens-dauthentification\/"},"modified":"2024-07-07T23:53:30","modified_gmt":"2024-07-07T21:53:30","slug":"digital-identity-cybermonth","status":"publish","type":"post","link":"https:\/\/memority.p2.pp-izhak.fr\/en\/digital-identity-cybermonth\/","title":{"rendered":"One tenant: multiple authentication methods"},"content":{"rendered":"<p>In its My-Access offering, Memority provides a set of mechanisms for organizing and personalizing user authentication to federated applications, depending on their identity, the device and network they are using, and the application they wish to access. With Memority, we always adapt!<\/p>\n<h3 class=\"wp-block-heading\"><strong>Let\u2019s set the scene<\/strong><\/h3>\n<p>Let\u2019s imagine a company, which we\u2019ll call myCompany. In myCompany, we have, of course, internal employees, but also service providers. The myCompany employees have access to the hardware provided by the company \u2013 PCs and smart cards, for example \u2013 enabling them to access IS applications. Service providers, on the other hand, come to myCompany using their own equipment (supplied by their service company). They must still be able to access myCompany\u2019s IS applications in order to carry out their work properly.<\/p>\n<h3 class=\"wp-block-heading\"><strong>The case of internal employees\u00a0<\/strong><\/h3>\n<p>To make authentication as seamless as possible for in-house employees, Memority can offer a variety of authentication methods, such as Kerberos, Windows Hello or smart card authentication, and, in addition, set up context-dependent adaptive authentication rules. For example, Kerberos authentication can be triggered automatically and directly if the user is not on a cell phone. If this is valid, authentication is totally transparent to the user. If, on the other hand, Kerberos authentication fails (because the user is not on the myCompany network and\/or not on a PC supplied by myCompany), then the other authentication modes available depending on the context can be proposed, such as the smart card, if this is detected on the workstation, or Windows Hello, if the user has previously enrolled the Windows Hello on the myCompany workstation. But what happens if an employee needs to access certain applications from a cell phone? As the previous authentication methods are limited to the PC, it is possible to add another method, such as login\/password, which would then be available only to employees, and only on a mobile device. myCompany employees would then have 4 different means of authentication to access IS applications. What a choice!<\/p>\n<p>&nbsp;<\/p>\n<div id=\"attachment_1421\" style=\"width: 468px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1421\" class=\"wp-image-1421 size-full\" src=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2023\/10\/id-pc-en-1.png\" alt=\"\" width=\"458\" height=\"528\" srcset=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2023\/10\/id-pc-en-1.png 458w, https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2023\/10\/id-pc-en-1-260x300.png 260w\" sizes=\"auto, (max-width: 458px) 100vw, 458px\" \/><p id=\"caption-attachment-1421\" class=\"wp-caption-text\">Automatic activation of Windows Hello on a PC<\/p><\/div>\n<div id=\"attachment_1423\" style=\"width: 361px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1423\" class=\"wp-image-1423 size-full\" src=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2023\/10\/Figure1-1.png\" alt=\"\" width=\"351\" height=\"425\" srcset=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2023\/10\/Figure1-1.png 351w, https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2023\/10\/Figure1-1-248x300.png 248w\" sizes=\"auto, (max-width: 351px) 100vw, 351px\" \/><p id=\"caption-attachment-1423\" class=\"wp-caption-text\">Automatic login\/password authentication on mobile<\/p><\/div>\n<h3 class=\"wp-block-heading\"><strong>The more sensitive case of service providers\u00a0<\/strong><\/h3>\n<p>But what about service providers? Since they don\u2019t have any hardware supplied by myCompany, they can\u2019t use Kerberos, Windows Hello or a smart card. Why not offer them the two-factor authentication capabilities of Memority\u2019s My-Keys offer? On a PC, the service provider could enroll a browser. Memority authentication would then be possible only on this browser, and specifically on this workstation. Alternatively, the provider could use the Memority mobile app available on the Android and iOS app stores to receive push notifications to validate during authentication. If the service provider does not have a mobile provided by his own company and does not wish to install an application on his personal mobile, sending an OTP by SMS or e-mail can also be proposed. The My-Keys offer enables the management of these various second factors: it determines who can benefit from it, what the associated activation process is, what actions are available in self-service, and so on. And so, of course, only those authentication methods activated for\/by the user will be offered to him\/her at authentication. This means that service providers also have 4 authentication methods for accessing myCompany IS applications. Equality, no jealousy!<\/p>\n<div id=\"attachment_1425\" style=\"width: 391px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1425\" class=\"wp-image-1425 size-full\" src=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2023\/10\/login-prestataire-en-1.png\" alt=\"\" width=\"381\" height=\"641\" srcset=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2023\/10\/login-prestataire-en-1.png 381w, https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2023\/10\/login-prestataire-en-1-178x300.png 178w\" sizes=\"auto, (max-width: 381px) 100vw, 381px\" \/><p id=\"caption-attachment-1425\" class=\"wp-caption-text\">Authentication methods for service providers<\/p><\/div>\n<h3 class=\"wp-block-heading\"><strong>The accessed application<\/strong><\/h3>\n<p>In addition to all these criteria based on identity, device and network, there\u2019s also the application accessed. For each authentication method defined at myCompany, a sensitivity level is defined. The same applies to each application federated with Memority. So, when accessing an application, whether you\u2019re an employee or a service provider, on a PC or a cell phone, inside or outside the company network, only those authentication methods whose sensitivity level is equal to or higher than that of the application are possible and therefore proposed during authentication (in combination with the criteria defined above).<\/p>\n<h3 class=\"wp-block-heading\"><strong>\u2026 and much, much more!<\/strong><\/h3>\n<p>This is just an example, of course. The customization of Memority adaptive authentication can be simplified or, on the contrary, extended to include other available authentication means, other identity criteria, etc. With Memority, anything is possible!<\/p>\n<div class=\"wp-block-uagb-container uagb-block-bf81a720\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In its My-Access offering, Memority provides a set of mechanisms for organizing and personalizing user authentication to federated applications, depending on their identity, the device and network they are using, and the application they wish to access. With Memority, we always adapt! Let\u2019s set the scene Let\u2019s imagine a company, which we\u2019ll call myCompany. In [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1013,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[34,36,30,35,31,32,33,37,38,41],"class_list":["post-1419","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classifiee","tag-annonce-en","tag-ciam-en","tag-cybersecurity-en","tag-frenchtech-en","tag-iam-en","tag-idaas-en","tag-identityfactory-en","tag-memoriteam-en","tag-memority2023-en","tag-my-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>One tenant: multiple authentication methods - Memority<\/title>\n<meta name=\"description\" content=\"Dans son offre MY-Access, Memority propose un ensemble de m\u00e9canismes pour organiser et personnaliser l\u2019authentification des utilisateurs aux applications f\u00e9d\u00e9r\u00e9es.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"One tenant: multiple authentication methods - Memority\" \/>\n<meta property=\"og:description\" content=\"Dans son offre MY-Access, Memority propose un ensemble de m\u00e9canismes pour organiser et personnaliser l\u2019authentification des utilisateurs aux applications f\u00e9d\u00e9r\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/\" \/>\n<meta property=\"og:site_name\" content=\"Memority\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-10T07:00:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-07T21:53:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/iStock-1343499203-1024x683-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Izhak-contenu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Izhak-contenu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/\",\"name\":\"One tenant: multiple authentication methods - Memority\",\"isPartOf\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/iStock-1343499203-1024x683-2.jpg\",\"datePublished\":\"2023-10-10T07:00:01+00:00\",\"dateModified\":\"2024-07-07T21:53:30+00:00\",\"author\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162\"},\"description\":\"Dans son offre MY-Access, Memority propose un ensemble de m\u00e9canismes pour organiser et personnaliser l\u2019authentification des utilisateurs aux applications f\u00e9d\u00e9r\u00e9es.\",\"breadcrumb\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/#primaryimage\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/iStock-1343499203-1024x683-2.jpg\",\"contentUrl\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/iStock-1343499203-1024x683-2.jpg\",\"width\":1024,\"height\":683,\"caption\":\"Big data. Information concept. 3D render\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"One tenant: multiple authentication methods\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#website\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/\",\"name\":\"Memority\",\"description\":\"L&#039;IDaaS europ\u00e9enau service des enjeux business\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/memority.p2.pp-izhak.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162\",\"name\":\"Izhak-contenu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g\",\"caption\":\"Izhak-contenu\"},\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/author\/izhak-contenu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"One tenant: multiple authentication methods - Memority","description":"Dans son offre MY-Access, Memority propose un ensemble de m\u00e9canismes pour organiser et personnaliser l\u2019authentification des utilisateurs aux applications f\u00e9d\u00e9r\u00e9es.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"One tenant: multiple authentication methods - Memority","og_description":"Dans son offre MY-Access, Memority propose un ensemble de m\u00e9canismes pour organiser et personnaliser l\u2019authentification des utilisateurs aux applications f\u00e9d\u00e9r\u00e9es.","og_url":"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/","og_site_name":"Memority","article_published_time":"2023-10-10T07:00:01+00:00","article_modified_time":"2024-07-07T21:53:30+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/iStock-1343499203-1024x683-2.jpg","type":"image\/jpeg"}],"author":"Izhak-contenu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Izhak-contenu","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/","url":"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/","name":"One tenant: multiple authentication methods - Memority","isPartOf":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/#primaryimage"},"image":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/#primaryimage"},"thumbnailUrl":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/iStock-1343499203-1024x683-2.jpg","datePublished":"2023-10-10T07:00:01+00:00","dateModified":"2024-07-07T21:53:30+00:00","author":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162"},"description":"Dans son offre MY-Access, Memority propose un ensemble de m\u00e9canismes pour organiser et personnaliser l\u2019authentification des utilisateurs aux applications f\u00e9d\u00e9r\u00e9es.","breadcrumb":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/#primaryimage","url":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/iStock-1343499203-1024x683-2.jpg","contentUrl":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/iStock-1343499203-1024x683-2.jpg","width":1024,"height":683,"caption":"Big data. Information concept. 3D render"},{"@type":"BreadcrumbList","@id":"https:\/\/memority.p2.pp-izhak.fr\/un-seul-tenant-plusieurs-moyens-dauthentification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/memority.p2.pp-izhak.fr\/en\/"},{"@type":"ListItem","position":2,"name":"One tenant: multiple authentication methods"}]},{"@type":"WebSite","@id":"https:\/\/memority.p2.pp-izhak.fr\/#website","url":"https:\/\/memority.p2.pp-izhak.fr\/","name":"Memority","description":"L&#039;IDaaS europ\u00e9enau service des enjeux business","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/memority.p2.pp-izhak.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162","name":"Izhak-contenu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g","caption":"Izhak-contenu"},"url":"https:\/\/memority.p2.pp-izhak.fr\/en\/author\/izhak-contenu\/"}]}},"_links":{"self":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/comments?post=1419"}],"version-history":[{"count":2,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1419\/revisions"}],"predecessor-version":[{"id":1427,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1419\/revisions\/1427"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/media\/1013"}],"wp:attachment":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/media?parent=1419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/categories?post=1419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/tags?post=1419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}