SlideShare a Scribd company logo
www.interoute.com
Overview
The Managed Secure Remote User Authentication service replaces static passwords with personalised, one-
time passwords via a “token” which can be used to grant access to the Interoute-supplied Roaming Access
service and extended to cover your own (or third party) cloud, applications or network.
The two factors involved here are ‘something you know’ and ‘something you have’. A common example of this
combination is a bank card: the personal identification number (PIN) is a secret know by the user, and the card
itself is the physical item (token).
The password an end user utilises to make use of this service is composed of a PIN and a piece of information
provided by a hardware or software token.
This multiple factor authentication reduces the incidence of online identity theft, because a password is no
longer enough to give a thief access to your VPN or applications.
Managed Secure Remote
User Authentication
2
www.interoute.com
Technical Service Details
Interoute, using carefully selected third parties, supplies and supports Two-Factor Authentication (also known
as 2FA) as either as a complement for Roaming Access via IPsec or SSL as well as a standalone service for your
own specific needs (for example, access to a web server, a cloud service, etc.)
Once implemented, the customer (via a nominated administrator) assumes control of the management and
provisioning of its token inventory using the 3
rd
party’s web portal.
The web portal allows the customer and their end users to perform basic operations with their tokens, such as
token re-synchronisation and PIN change.
When ordered as a standalone service, the customer is responsible of configuring their equipment to send
authentication requests directly to the 2FA supplier’s infrastructure. Interoute can provide configuration
documentation from the supplier as well as give support customers who require it.
Interoute 2FA service is supported by hardware or software tokens:
Hardware tokens (fob)
A hardware token is similar to a key-fob, which shows the current one-time password. The token is
synchronised with the authentication server and the password cycles regularly.
Hardware tokens are tamper-resistant, tamper-evident and machine independent, allowing a user to logon
from any location or machine.
Software-based token
A cryptography piece of software is installed on your computer or smart phone, which generates a one-time
password anytime you have to present your login credentials.
Software tokens can be massively deployed without hardware distribution. See the table under Customer
Requirements for available platforms.
Note: Interoute provides limited support for software-related troubleshooting (see Limitations).
3
www.interoute.com
Customer Requirements
Once the tokens are shipped to a designated customer location – for hardware tokens – or made available to
the customer via the 3
rd
party portal for software tokens – it is the customer’s responsibility to enrol the end
users.
The software tokens can be used on the following platforms:
Platform Operating System
Windows PC (32/64 bit) XP, Vista, 7, 2003 Server, 2008 Server
iPhone, iPad iOS 4.1 or later
BlackBerry OS 4.5 or later
Table 1: Platform and operating system availability for software tokens
Supported Service Changes
• For any existing service, you can order additional tokens (regardless of type)
Reporting
Token usage log and any authentication events are available via the 3
rd
party web portal.
Limitations
Support scope for software tokens is limited to dealing with outages affecting the 2FA provider service; any
problems resulting from non-network customer configuration or faults in computer and network operating
systems (e.g. Windows, Blackberry, Apple iOS, etc.) or any third party software are not within scope.
Billing
The following Billing plan is available for Interoute’s Managed Secure Remote User Authentication Service:
• An initial non-recurring charge for service setup and – if applicable – token purchase.
• A monthly flat rate charge based on the number of tokens
Product Codes
Service Code
Two-Factor Authentication SVC-TOKEN
Related services
The Managed Secure Remote User Authentication Service improves security of Roaming Access Service to
VPN
How to order
Order through an Interoute Account Manager or via the HUB, Interoute’s online portal.
More information
For product enquiries, please consult the Security Services Product Manager.

More Related Content

PDF
Secure Code Generation for Multi-level Mutual Authentication
PDF
Psdot 19 four factor password authentication
PDF
Protecting Your POS System from PoSeidon and Other Malware Attacks
PDF
Why Two-Factor Authentication?
PDF
Multi Factor Authentication
PDF
Session 7 e_raja_kailar
PDF
Sp 29 two_factor_auth_guide
PPTX
Cryptography in user authentication
Secure Code Generation for Multi-level Mutual Authentication
Psdot 19 four factor password authentication
Protecting Your POS System from PoSeidon and Other Malware Attacks
Why Two-Factor Authentication?
Multi Factor Authentication
Session 7 e_raja_kailar
Sp 29 two_factor_auth_guide
Cryptography in user authentication

What's hot (20)

PDF
Sensor GPP Presentation June 2008
PDF
Securing corporate assets_with_2_fa
PDF
Two factor authentication
PDF
3 reasons your business can't ignore Two-Factor Authentication
PDF
Two-factor Authentication
DOCX
A Complete Software Engineer With Hardware / Networking Skill's
PDF
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
PDF
Combat the Latest Two-Factor Authentication Evasion Techniques
PDF
Glossary of PCI terms
PPT
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
PPTX
Smart pass smartphone MFA password manager
PPTX
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
PPTX
Authentication(pswrd,token,certificate,biometric)
PDF
120 i143
PDF
Adding Two Factor Authentication to your App with Authy
PDF
Introduction to Solus
PDF
Authentication techniques
PDF
Avoiding Two-factor Authentication? You're Not Alone
PPT
Online voting job presentation
PPT
CTO-CyberSecurityForum-2010-Brisson-Boren
Sensor GPP Presentation June 2008
Securing corporate assets_with_2_fa
Two factor authentication
3 reasons your business can't ignore Two-Factor Authentication
Two-factor Authentication
A Complete Software Engineer With Hardware / Networking Skill's
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
Combat the Latest Two-Factor Authentication Evasion Techniques
Glossary of PCI terms
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
Smart pass smartphone MFA password manager
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Authentication(pswrd,token,certificate,biometric)
120 i143
Adding Two Factor Authentication to your App with Authy
Introduction to Solus
Authentication techniques
Avoiding Two-factor Authentication? You're Not Alone
Online voting job presentation
CTO-CyberSecurityForum-2010-Brisson-Boren
Ad

Similar to Datasheet two factor-authenticationx (20)

PDF
Transecq ITA
DOC
87559489 auth
PPT
Oauth tutorial
PDF
Entrust IdentityGuard Mobile
PPTX
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
PDF
2p Mta Data Sheet V1.7 X1a
PDF
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
PDF
Key2 share moosecon
PPTX
Digital authentication
PDF
Introduction to OAuth 2.0 - Part 1
PPTX
CIS 2012 - Going Mobile with PingFederate and OAuth 2
PPTX
Passwords are passé. WebAuthn is simpler, stronger and ready to go
PDF
How to 2FA-enable Open Source Applications
PPTX
Introduction to OAuth 2.0 - Part 1
PDF
Draft Ietf Oauth V2 12
PDF
Assurity seminar 24 jan
PDF
OAuth: Trust Issues
PDF
WebAuthn & FIDO2
PPTX
Fear and Loathing of 2fa
PDF
SmartCard Forum 2010 - Enterprise authentication
Transecq ITA
87559489 auth
Oauth tutorial
Entrust IdentityGuard Mobile
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
2p Mta Data Sheet V1.7 X1a
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
Key2 share moosecon
Digital authentication
Introduction to OAuth 2.0 - Part 1
CIS 2012 - Going Mobile with PingFederate and OAuth 2
Passwords are passé. WebAuthn is simpler, stronger and ready to go
How to 2FA-enable Open Source Applications
Introduction to OAuth 2.0 - Part 1
Draft Ietf Oauth V2 12
Assurity seminar 24 jan
OAuth: Trust Issues
WebAuthn & FIDO2
Fear and Loathing of 2fa
SmartCard Forum 2010 - Enterprise authentication
Ad

More from Hai Nguyen (20)

PDF
Sms based otp
PDF
Scc soft token datasheet
PDF
Rsa two factorauthentication
PDF
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
PDF
Pg 2 fa_tech_brief
PDF
Ouch 201211 en
PDF
N ye c-rfp-two-factor-authentication
PDF
Multiple credentials-in-the-enterprise
PDF
Mobile authentication
PDF
Ijcsi 9-4-2-457-462
PDF
Identity cues two factor data sheet
PDF
Hotpin datasheet
PDF
Gambling
PDF
Ds netsuite-two-factor-authentication
PDF
Csd6059
PDF
Cryptomathic white paper 2fa for banking
PDF
Citrix sb 0707-lowres
PDF
Bi guardotp
PDF
Attachment 1 – mitigation measures for two factor authentication compromise
PDF
Ams 2 fa april 2013
Sms based otp
Scc soft token datasheet
Rsa two factorauthentication
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Pg 2 fa_tech_brief
Ouch 201211 en
N ye c-rfp-two-factor-authentication
Multiple credentials-in-the-enterprise
Mobile authentication
Ijcsi 9-4-2-457-462
Identity cues two factor data sheet
Hotpin datasheet
Gambling
Ds netsuite-two-factor-authentication
Csd6059
Cryptomathic white paper 2fa for banking
Citrix sb 0707-lowres
Bi guardotp
Attachment 1 – mitigation measures for two factor authentication compromise
Ams 2 fa april 2013

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Modernizing your data center with Dell and AMD
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Encapsulation theory and applications.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Modernizing your data center with Dell and AMD
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
Spectral efficient network and resource selection model in 5G networks
Dropbox Q2 2025 Financial Results & Investor Presentation
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Review of recent advances in non-invasive hemoglobin estimation
Encapsulation theory and applications.pdf
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Monthly Chronicles - July 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

Datasheet two factor-authenticationx

  • 1. www.interoute.com Overview The Managed Secure Remote User Authentication service replaces static passwords with personalised, one- time passwords via a “token” which can be used to grant access to the Interoute-supplied Roaming Access service and extended to cover your own (or third party) cloud, applications or network. The two factors involved here are ‘something you know’ and ‘something you have’. A common example of this combination is a bank card: the personal identification number (PIN) is a secret know by the user, and the card itself is the physical item (token). The password an end user utilises to make use of this service is composed of a PIN and a piece of information provided by a hardware or software token. This multiple factor authentication reduces the incidence of online identity theft, because a password is no longer enough to give a thief access to your VPN or applications. Managed Secure Remote User Authentication
  • 2. 2 www.interoute.com Technical Service Details Interoute, using carefully selected third parties, supplies and supports Two-Factor Authentication (also known as 2FA) as either as a complement for Roaming Access via IPsec or SSL as well as a standalone service for your own specific needs (for example, access to a web server, a cloud service, etc.) Once implemented, the customer (via a nominated administrator) assumes control of the management and provisioning of its token inventory using the 3 rd party’s web portal. The web portal allows the customer and their end users to perform basic operations with their tokens, such as token re-synchronisation and PIN change. When ordered as a standalone service, the customer is responsible of configuring their equipment to send authentication requests directly to the 2FA supplier’s infrastructure. Interoute can provide configuration documentation from the supplier as well as give support customers who require it. Interoute 2FA service is supported by hardware or software tokens: Hardware tokens (fob) A hardware token is similar to a key-fob, which shows the current one-time password. The token is synchronised with the authentication server and the password cycles regularly. Hardware tokens are tamper-resistant, tamper-evident and machine independent, allowing a user to logon from any location or machine. Software-based token A cryptography piece of software is installed on your computer or smart phone, which generates a one-time password anytime you have to present your login credentials. Software tokens can be massively deployed without hardware distribution. See the table under Customer Requirements for available platforms. Note: Interoute provides limited support for software-related troubleshooting (see Limitations).
  • 3. 3 www.interoute.com Customer Requirements Once the tokens are shipped to a designated customer location – for hardware tokens – or made available to the customer via the 3 rd party portal for software tokens – it is the customer’s responsibility to enrol the end users. The software tokens can be used on the following platforms: Platform Operating System Windows PC (32/64 bit) XP, Vista, 7, 2003 Server, 2008 Server iPhone, iPad iOS 4.1 or later BlackBerry OS 4.5 or later Table 1: Platform and operating system availability for software tokens Supported Service Changes • For any existing service, you can order additional tokens (regardless of type) Reporting Token usage log and any authentication events are available via the 3 rd party web portal. Limitations Support scope for software tokens is limited to dealing with outages affecting the 2FA provider service; any problems resulting from non-network customer configuration or faults in computer and network operating systems (e.g. Windows, Blackberry, Apple iOS, etc.) or any third party software are not within scope. Billing The following Billing plan is available for Interoute’s Managed Secure Remote User Authentication Service: • An initial non-recurring charge for service setup and – if applicable – token purchase. • A monthly flat rate charge based on the number of tokens Product Codes Service Code Two-Factor Authentication SVC-TOKEN Related services The Managed Secure Remote User Authentication Service improves security of Roaming Access Service to VPN How to order Order through an Interoute Account Manager or via the HUB, Interoute’s online portal. More information For product enquiries, please consult the Security Services Product Manager.