Identity requirements
Ready to simplify access management?
We'd love to help you get to more maintainable access controls
Authentication
Authentication is the process of verifying the identity of the users accessing an organization's systems: it's just checking that you are who you say you are when you log into company systems. Authentication ensures that only legitimate users get access, and help keep a record of who actually performed a specific action.
Password and credential management
Passwords are still the foundation of authentication and the focus of most compliance requirements.
But things have changed: we used to rely solely on basic authentication using username/password combinations, making password policies critical. Now, with multi-factor authentication and passkeys becoming mainstream, authentication requirements are evolving.
Common compliance requirements
Compliance frameworks do not typically have requirements for what happens if a password is discovered to be compromised, or discovered in a data breach. Needless to say, you should rotate it and may need to treat it as an incident.
Multi-Factor Authentication (MFA)
Multi-factor authentication requires users to provide multiple ways to verify their identity before gaining access. MFA is typically some combination of something you know (like a password), something you have (like your phone), and something you are (like your fingerprint).
Multi-factor authentication (MFA) is more commonly referenced than two-factor authentication (2FA), since multiple factors could be required.
Common compliance requirements
Session management
Session management decides how long after login a user's authentication remains valid, and when they must re-authenticate. This helps prevent unauthorized access through abandoned or hijacked sessions.
Common compliance requirements
Authentication attempts
Limiting the number of authentication attempts helps prevent automated brute force attacks, such as credential stuffing.
Common compliance requirements
Service accounts
Service accounts are credentials used by services or applications to access resources, including for service-to-service communication. Service account credentials are typically API keys or certificates.