IBM Security Access Manager for Enterprise Single Sign-On, Version 8.2

Configuring a strong authentication setup

Authentication factors come in different forms and functions, such as passwords and devices that work like a key. A strong authentication setup reduces the risk of security compromises. You can implement a second authentication factor or an alternative authentication factor to secure user sessions.

You can use the devices or codes as second authentication factors. You can also use fingerprint as an alternative authentication factor to password.

See the following topics for more information.

Tip: See the IBM Security Access Manager for Enterprise Single Sign-On Planning and Deployment Guide for a list of supported authentication devices and middleware.


Feedback