Page 8 - High Assurance Authentication that Empowers User Experiences
P. 8

Secure Access to non-FIDO


               Enabled Resources













               How do you securely provision access to legacy
               applications that are not FIDO enabled?


               While FIDO2 support is growing and        In scenarios where companies use
               X.509, a standard format for public       legacy enterprise applications, including
               key certificates, has long provided a     in-house developed applications and
               means for strong authentication, the      VPN solutions with static passwords,
               reality is that most enterprises continue   Crescendo security keys can replace or
               to maintain legacy applications. Your     augment static passwords with one-time
               organization might run on critical        passwords to increase security and pave
               infrastructure that cannot easily be      the road to Zero Trust. Crescendo security
               migrated to the cloud. Still, you need a   keys can store an OATH-based credential,
               way to secure those applications since    validated by an authentication service or
               continued reliance on password-only       server, allowing for increased security
               authentication increases their threat     without a significant negative impact on
               profile. To bring your legacy applications   the overall user experience or a need
               under the protection of a comprehensive   to replace existing infrastructure. If the
               security strategy, you will need a solution   application is connected to Azure AD,
               that replaces passwords, but the last     Crescendo security keys can also provide
               thing a company wants is yet another      certificate-based authentication through
               product to manage. What if you could      Azure AD CBA.
               get a single solution to address every
               authentication use case, from logical to
               physical access requirements?






















        8
   3   4   5   6   7   8   9   10   11   12