Secure Access (Zero Trust Authentication)
What is Zero Trust Authentication in Beyond Identity?
Beyond Identity developed a Zero Trust Authentication tool that provides secure access for all employees and contractors.
-
Phishing-resistant MFA: Authenticate both the user and their device with only phishing-resistant factors and credential operations with device-bound passkeys and ZERO reliance on humans in the authentication loop.
-
Single-device, passwordless UX: Single-device, passwordless login experiences that takes out the speedbumps in authentication across every device and OS (including Linux!)
-
Continuous authentication: Re-evaluates user, device, and third-party risk signals every 10 minutes and enforces risk-based policy against these ongoing evaluations even during active sessions. Combined with the ability to set policies on a per-application basis, a new capability introduced with our SSO, you can easily leverage continuous authentication for high risk applications.
-
Fine-grained device trust: Protect sensitive apps by defining fine-grained, adaptive risk-based policies on a per application basis.
Available features may vary based on the package selected.
Quickstart checklist
Review the following steps for the fastest way to get started using Zero Trust Authentication.
-
Add policy rules to allow or deny authentications.
-
(Optional) Configure branding to match your corporate look-and-feel for the email that will be sent to users to enroll their devices.
-
Add users (identities) to the Beyond Identity platform.
Once you've added users, you can add a Passkey. This will send an email to the user to enroll their device.
noteYou may want to add a group and assign the users first, and then return to the Identities page to add a passkey.
-
Review events.