Just Enough
Authentication
Making the authentication journey frictionless
Diane Joyce
Matakite
A bit about me
Programmer Analyst/Programmer Project Manager System Designer Architect – Integration/
Solution/ Enterprise
Identity Consultant
Diane Joyce - Matakite 2
Just enough authentication
 With Big Data, smart devices and the rapid evolution of biometrics, the current
one size fits all authentication model should be dead.
 In today's digital world the customer has high expectations and low brand loyalty,
the winner is always the organisation that makes it easy but retains the security.
 Some times referred to as Frictionless or Zero Touch authentication, I think of it as
‘just enough authentication’ to avoid risk whilst retaining the customer , it could
also be referred to as Just in Time Authentication
 Remove or minimise the inputs a customer needs to provide to authenticate
themselves
 Apply a risk based model to determine when to apply additional authentication
 Authentication now become a key part of the UX journey and not a bolt-on at the
front
Diane Joyce - Matakite 3
Risk Based Authentication Principles
 Aim for as little customer input as possible
 Throw away the concept of one size
authentication fits all
 Determine the risk model on a transactional basis
 We own cyber security not the customer
 Redesign your transactions to be flexible
 Use the same model for internal and external
authentications
Diane Joyce - Matakite 4
As little data input as possible
 Aim to have the customer only provide credential information as and when
needed
 The less provided the less is able to be compromised
 Don’t always use the same credential sets
 Have lots of options and mix them up
 Use point and click as much as possible
Diane Joyce - Matakite 5
Categorise the risk
 Could be data, could be value
 If steal my name and address from a website, not so great but this data is pretty
freely available
 If you steal my name, address, dob, I’m a bit more concerned but this data is still
quite freely available
 If you steal my ALL login credentials and like 80% of people I used the same
passwords on various sites then I’m concerned
 If you lock me out of my account when I need it, I’m annoyed
 If you steal my money, now I’m unhappy
Diane Joyce - Matakite 6
Create multifactor authentication
tokens at registration
 Don’t restrict this to 2 factor,
capture as much as possible
 Some is provided by the customer
 Password
 Memorable word/picture
 Device for OTP or authenticator app
 Fingerprint
 Voice
 Facial recognition
 Ear print
 Signature
 Some we can capture with customer
consent but without customer input
 Device information including UID,
virus status, security apps
 Location
 Typing pattern analysis
 Pointing device pattern analysis
 Gait analysis
 Device location history
 Device usage history
 Device proximity
 Network connectivity
Diane Joyce - Matakite 7
We own cyber security
 We are the experts
 Expecting customer to be aware of and up-to-date with cyber security is not
feasible
 We can guide them to a more secure experience
 BYOD, Cloud, SaaS, IDaaS changes the traditional security perimeter, we need
to secure from endpoint thru to data sources
 Big data offers a valuable resource for identifying threats in both real time
and post event analysis
 Understanding device vulnerability is critical
Diane Joyce - Matakite 8
Make the transaction digital
 The risk model dictates
 The authentication required
 The data shown on the screen
 The transactions available
 The action to take
 Risk Models change, Products Change, Security Models change and
need to be designed flexibly
 Use rules based workflow
 Use dynamic screens to show only the data applicable to the risk model
AND the authentication level
 Its not standalone design, include it in both the UX and security
design.
Diane Joyce - Matakite 9
Let’s step through some examples
Diane Joyce - Matakite 10
Registration
Enter
personal
details
Create
username
Create
Password
Create multi-
factor
Validate and
verify
personal
details
Validate
username
Validate
Password
Create multi-
factor
Create
baseline
credentials
Diane Joyce - Matakite 11
Authentication to view a balance
Enter
Username
Validate
Username
Validate
Credentials
View balance Assess Risk
Select View
Balance
Valid
Credentia
ls ?
Invalid
credential
process
Diane Joyce - Matakite 12
One size fits all
Authentication to view a balance -
comparison
Enter
Username
Validate
Username
Validate
Credentials
View balance Assess Risk
Select View
Balance
Valid
Credentia
ls ?
Invalid
credential
process
Enter
Username
Enter
password
Enter 2nd
Factor
Select View
Balance
Diane Joyce - Matakite 13
Authentication to view a balance – new
device
Enter
Username
Validate
Username
Validate
Credentials
View
balance
Request
Additional
Credential
Enter
additional
credential
Valid
Credenti
al?
Assess Risk
Select
Balance
Validate
Credentials
Diane Joyce - Matakite 14
Authentication to pay an existing payee
Enter
Username
Validate
Username
Validate
Credentials
Enter
Payment
details
Request
Additional
Credential
Enter
additional
credential
Valid
Credential
?
Assess Risk
Select
Payment
Validate
Credential
Confirm
Payment
Risk Process
Credentials
process
Risk
Acceptable
?
Diane Joyce - Matakite 15
Authentication to pay a new payee
Enter
Username
Validate
Username
Validate
Credentials
Enter
Payment
details
Request
Additional
Credential
Enter
additional
credential
Valid
Credential
?
Assess Risk
Select
Payment
Validate
Credential
Confirm
Payment
Credentials
process
Risk
Acceptable?
Enter
additional
credential
Validate
CredentialDiane Joyce - Matakite 16
In summary
 Throw away the one size fits all authentication
 Take the burden from the customer
 Use risk based rules to determine how and when to
authenticate
 Authentication can take place anywhere in the
customer journey
 Authenticate internal and external users in the same
way
 Own the cyber security responsibility
Diane Joyce - Matakite 17
Questions?
Diane.Joyce@matakitegroup.com
@kiwiIDgal
Diane Joyce - Matakite 18

More Related Content

PPTX
When a Certificate Authority Fails, How Quickly Can You Restore Trust?
PPTX
15 Years of Web Security: The Rebellious Teenage Years
PPTX
Building securable infrastructures
PDF
WhiteHat Security Website Statistics [Full Report] (2013)
PPTX
No More Snake Oil: Why InfoSec Needs Security Guarantees
PPTX
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
PDF
Website Security Statistics Report 2013
PPT
Portal Protection Using Adaptive Authentication
When a Certificate Authority Fails, How Quickly Can You Restore Trust?
15 Years of Web Security: The Rebellious Teenage Years
Building securable infrastructures
WhiteHat Security Website Statistics [Full Report] (2013)
No More Snake Oil: Why InfoSec Needs Security Guarantees
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Website Security Statistics Report 2013
Portal Protection Using Adaptive Authentication

What's hot (15)

PPTX
IT security
PDF
Using Security Metrics to Drive Action
PPTX
2014-15 Cybersecurity Venture Funding and M&A
PDF
Digital Transformation and Security for the Modern Business Part 1 – Finance
PPT
Security&reliability
PDF
Improving Security Metrics
PDF
How to Establish a Cyber Security Readiness Program
PPTX
Why Two-Factor Isn't Enough
PDF
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
PPTX
The Easy WAy to Accept & Protect Credit Card Data
PPTX
Best of Both Worlds: Correlating Static and Dynamic Analysis Results
PDF
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
PDF
Risksense: 7 Experts on Threat and Vulnerability Management
PDF
Issp for Uadigitals 2019
PPTX
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
IT security
Using Security Metrics to Drive Action
2014-15 Cybersecurity Venture Funding and M&A
Digital Transformation and Security for the Modern Business Part 1 – Finance
Security&reliability
Improving Security Metrics
How to Establish a Cyber Security Readiness Program
Why Two-Factor Isn't Enough
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
The Easy WAy to Accept & Protect Credit Card Data
Best of Both Worlds: Correlating Static and Dynamic Analysis Results
Webinar | Cybersecurity vulnerabilities of your business - Berezha Security G...
Risksense: 7 Experts on Threat and Vulnerability Management
Issp for Uadigitals 2019
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Ad

Similar to Just Enough Authentication (20)

PPTX
Risk Aware IAM for an Insecure World
PDF
The 10 most trusted authentication solution providers of 2021
PDF
Identity Verification
DOCX
5 Best Identity Verification Software to Look Into in 2022.docx
PDF
A Simplified Guide to the Evolution of Authentication!
PDF
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
PPTX
Role Of Two Factor Authentication In Safeguarding Online Transactions
PPTX
AY - Adaptive Access Control
PDF
What Types Of Information ECommerce Sites Need To.pdf
PDF
5 Reasons Why Your Business Should Consider Strong Authentication!
PDF
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
PDF
How Passwordless Authentication Reduces Risks of Data Breaches.pdf
PPTX
Security and Privacy
PPTX
Fraud Prevention - Experian
PDF
How to Create a Secure and Efficient Payment Gateway.pdf
PDF
Deliver the ‘Right’ Customer Experience without Compromising Data Security
PDF
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
PPS
Application Security Review 5 Dec 09 Final
PPTX
What Is Code Signing Certificate and Why It Is Significant in 2025
PDF
Going beyond MFA(Multi-factor authentication)-Future demands much more
Risk Aware IAM for an Insecure World
The 10 most trusted authentication solution providers of 2021
Identity Verification
5 Best Identity Verification Software to Look Into in 2022.docx
A Simplified Guide to the Evolution of Authentication!
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
Role Of Two Factor Authentication In Safeguarding Online Transactions
AY - Adaptive Access Control
What Types Of Information ECommerce Sites Need To.pdf
5 Reasons Why Your Business Should Consider Strong Authentication!
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
How Passwordless Authentication Reduces Risks of Data Breaches.pdf
Security and Privacy
Fraud Prevention - Experian
How to Create a Secure and Efficient Payment Gateway.pdf
Deliver the ‘Right’ Customer Experience without Compromising Data Security
KuppingerCole CIWUSA17 - Chaining Identity Blocks to boost your UX and KYC st...
Application Security Review 5 Dec 09 Final
What Is Code Signing Certificate and Why It Is Significant in 2025
Going beyond MFA(Multi-factor authentication)-Future demands much more
Ad

More from ForgeRock Identity Tech Talks (16)

PDF
Deep dive into the Open Banking payments flows
PDF
Implementing Open Banking with ForgeRock
PDF
Anonymity, Trust, Accountability
PDF
Gov.uk Verify - The Journey So Far
PDF
EU Single Digital Market - eIDAS To The Rescue
PDF
Delivering Identity at Internet Scale
PDF
The Slow Death of Passwords
PDF
Steak and OAuth Pi
PDF
Share All The Things With UMA
PDF
A Deep Dive Into Identity Work Flow
PDF
Rethinking The Policy Agent
PDF
Authorization Using JWTs
PDF
Mobile Authentication - Moving Towards a Passwordless Future
PDF
Introduction to SAML & OIDC
Deep dive into the Open Banking payments flows
Implementing Open Banking with ForgeRock
Anonymity, Trust, Accountability
Gov.uk Verify - The Journey So Far
EU Single Digital Market - eIDAS To The Rescue
Delivering Identity at Internet Scale
The Slow Death of Passwords
Steak and OAuth Pi
Share All The Things With UMA
A Deep Dive Into Identity Work Flow
Rethinking The Policy Agent
Authorization Using JWTs
Mobile Authentication - Moving Towards a Passwordless Future
Introduction to SAML & OIDC

Recently uploaded (20)

PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
2018-HIPAA-Renewal-Training for executives
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
The various Industrial Revolutions .pptx
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Architecture types and enterprise applications.pdf
PDF
CloudStack 4.21: First Look Webinar slides
Abstractive summarization using multilingual text-to-text transfer transforme...
sbt 2.0: go big (Scala Days 2025 edition)
1 - Historical Antecedents, Social Consideration.pdf
Flame analysis and combustion estimation using large language and vision assi...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
NewMind AI Weekly Chronicles – August ’25 Week III
Hindi spoken digit analysis for native and non-native speakers
Consumable AI The What, Why & How for Small Teams.pdf
sustainability-14-14877-v2.pddhzftheheeeee
Developing a website for English-speaking practice to English as a foreign la...
2018-HIPAA-Renewal-Training for executives
Enhancing emotion recognition model for a student engagement use case through...
The various Industrial Revolutions .pptx
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Chapter 5: Probability Theory and Statistics
A comparative study of natural language inference in Swahili using monolingua...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Architecture types and enterprise applications.pdf
CloudStack 4.21: First Look Webinar slides

Just Enough Authentication

  • 1. Just Enough Authentication Making the authentication journey frictionless Diane Joyce Matakite
  • 2. A bit about me Programmer Analyst/Programmer Project Manager System Designer Architect – Integration/ Solution/ Enterprise Identity Consultant Diane Joyce - Matakite 2
  • 3. Just enough authentication  With Big Data, smart devices and the rapid evolution of biometrics, the current one size fits all authentication model should be dead.  In today's digital world the customer has high expectations and low brand loyalty, the winner is always the organisation that makes it easy but retains the security.  Some times referred to as Frictionless or Zero Touch authentication, I think of it as ‘just enough authentication’ to avoid risk whilst retaining the customer , it could also be referred to as Just in Time Authentication  Remove or minimise the inputs a customer needs to provide to authenticate themselves  Apply a risk based model to determine when to apply additional authentication  Authentication now become a key part of the UX journey and not a bolt-on at the front Diane Joyce - Matakite 3
  • 4. Risk Based Authentication Principles  Aim for as little customer input as possible  Throw away the concept of one size authentication fits all  Determine the risk model on a transactional basis  We own cyber security not the customer  Redesign your transactions to be flexible  Use the same model for internal and external authentications Diane Joyce - Matakite 4
  • 5. As little data input as possible  Aim to have the customer only provide credential information as and when needed  The less provided the less is able to be compromised  Don’t always use the same credential sets  Have lots of options and mix them up  Use point and click as much as possible Diane Joyce - Matakite 5
  • 6. Categorise the risk  Could be data, could be value  If steal my name and address from a website, not so great but this data is pretty freely available  If you steal my name, address, dob, I’m a bit more concerned but this data is still quite freely available  If you steal my ALL login credentials and like 80% of people I used the same passwords on various sites then I’m concerned  If you lock me out of my account when I need it, I’m annoyed  If you steal my money, now I’m unhappy Diane Joyce - Matakite 6
  • 7. Create multifactor authentication tokens at registration  Don’t restrict this to 2 factor, capture as much as possible  Some is provided by the customer  Password  Memorable word/picture  Device for OTP or authenticator app  Fingerprint  Voice  Facial recognition  Ear print  Signature  Some we can capture with customer consent but without customer input  Device information including UID, virus status, security apps  Location  Typing pattern analysis  Pointing device pattern analysis  Gait analysis  Device location history  Device usage history  Device proximity  Network connectivity Diane Joyce - Matakite 7
  • 8. We own cyber security  We are the experts  Expecting customer to be aware of and up-to-date with cyber security is not feasible  We can guide them to a more secure experience  BYOD, Cloud, SaaS, IDaaS changes the traditional security perimeter, we need to secure from endpoint thru to data sources  Big data offers a valuable resource for identifying threats in both real time and post event analysis  Understanding device vulnerability is critical Diane Joyce - Matakite 8
  • 9. Make the transaction digital  The risk model dictates  The authentication required  The data shown on the screen  The transactions available  The action to take  Risk Models change, Products Change, Security Models change and need to be designed flexibly  Use rules based workflow  Use dynamic screens to show only the data applicable to the risk model AND the authentication level  Its not standalone design, include it in both the UX and security design. Diane Joyce - Matakite 9
  • 10. Let’s step through some examples Diane Joyce - Matakite 10
  • 12. Authentication to view a balance Enter Username Validate Username Validate Credentials View balance Assess Risk Select View Balance Valid Credentia ls ? Invalid credential process Diane Joyce - Matakite 12
  • 13. One size fits all Authentication to view a balance - comparison Enter Username Validate Username Validate Credentials View balance Assess Risk Select View Balance Valid Credentia ls ? Invalid credential process Enter Username Enter password Enter 2nd Factor Select View Balance Diane Joyce - Matakite 13
  • 14. Authentication to view a balance – new device Enter Username Validate Username Validate Credentials View balance Request Additional Credential Enter additional credential Valid Credenti al? Assess Risk Select Balance Validate Credentials Diane Joyce - Matakite 14
  • 15. Authentication to pay an existing payee Enter Username Validate Username Validate Credentials Enter Payment details Request Additional Credential Enter additional credential Valid Credential ? Assess Risk Select Payment Validate Credential Confirm Payment Risk Process Credentials process Risk Acceptable ? Diane Joyce - Matakite 15
  • 16. Authentication to pay a new payee Enter Username Validate Username Validate Credentials Enter Payment details Request Additional Credential Enter additional credential Valid Credential ? Assess Risk Select Payment Validate Credential Confirm Payment Credentials process Risk Acceptable? Enter additional credential Validate CredentialDiane Joyce - Matakite 16
  • 17. In summary  Throw away the one size fits all authentication  Take the burden from the customer  Use risk based rules to determine how and when to authenticate  Authentication can take place anywhere in the customer journey  Authenticate internal and external users in the same way  Own the cyber security responsibility Diane Joyce - Matakite 17