

Platform authenticators are bound to a specific device and the operating system will manage the authentication. You just plug it in the USB port or hold it against the NFC reader of your computer or smartphone. If you use a hardware authenticator you can use it on any device you need to log into a website. And some even have a display to show you informations about the website. Some also support biometrics like your fingerprint. Most hardware tokens have a button to confirm the authentication. There are also some hardware token for the iPhone lightning connector.

Hardware FIDO authenticators like a Yubikey security stick can use connectors like USB, BT or NFC. security keys and platform authenticators.

There are two different kinds of FIDO authenticators to authenticate yourself on a website: Hardware tokens a.k.a.
SECSIGN ID ANDROID
iPhone, Macbook, Windows Hello PC or Android Phone as FIDO token without additional app or hardware (platform authenticators) The user is then authenticated with the touch of a button. Or it will utilize the built-in platform authenticator by asking for a fingerprint or using the face recognition capability of the smart phone or computer. When visiting the secured web service, the browser will ask the user to connect the FIDO authenticator to the device and press a button to register/login. In practice the user will register one or more FIDO authenticators on a web service and can then use it to authenticate and confirm a sign-in for example. FIDO2 enables users to leverage common devices to easily authenticate passwordless to online services both in mobile and desktop environments, and to utilize authenticators including USB/NFC security keys like the YubiKey or smartphones. All data is protected from unauthorized access by a next-generation two-factor authentication, either by using a smartphone or a smart card.FIDO2 is a set of specifications including the World Wide Web Consortium’s (W3C) Web Authentication (WebAuthn) specification and the FIDO Alliance’s corresponding Client-to-Authenticator Protocol (CTAP). Private cloud-storage on your own server ? With SecSign Portal by SecCommerce you can now use your own cloud service which is operated by yourself. Because sensitive corporate data needs more than simple password-based authentification.Įncryption ? Whether you need server-based encryption or client-based end-to-end encryption, we have the right solution for you.
SECSIGN ID REGISTRATION
For archiving compliant to auditing requirements a qualified time stamp is required.ĭigital Mailroom ? Realization of prompt registration and forwarding of all incoming mail by using a complete digital mailroom.Īuthentification ? We offer safe authentification via SecSign ID and/or smart card. Every post item is signed after being scanned. Substitute scanning and signing (E-Files) ? Substitute scanning is provided with a SecArchive-Client in combination with the SecPKI-Server. Mobile signature ? Using the signature via transaction data to conveniently generate a mobile signature.

Signature-Tools & Web-Applications ? Use the SecSigner to easily and convenient prepare and verify digital signatures for documents or data or directly in the browser. Use it for HR processes, digital contracts, signature requests and custom workflows. Signature Portal ? An easy and accessible solution to digitize all complex signature processes and workflows combined into one portal.
