Our secure Authenticator app was built from the ground up with security by design, privacy by design and convenience in mind. It was made by developers for developers. Our custom PAM module is built following the NIST standards and is available as a separate download.
A hardware generated key is stored inside smartphone's HSM chip such that it cannot be extracted. Only you can access it by unlocking your smartphone with your preferred unlock method including biometrics (fingerprint, faceID, etc.).
Using key-based authentication, no passwords and two factor authentication, has undoubtedly become the de-facto standard today to secure and harden your servers when remotely accessing them via SSH. However, current 2FA authentication solutions are based on shared knowledge and require users to type in six-digit TOTP codes on every authentication or even with every transaction made with the servers.
Multi Factor authentication without having to enter 6-digit codes.
Using the SSH Authenticator enables strong authentication by default.
Say goodbye to phishing and weak, knowledge-based factors.
Even administrators can't know your login credentials.
Spot and end any unwanted or forgotten session directly in the app.
Get verifiable assurance with every authentication.
Automatic synchronisation to multiple devices for all connections.
Easily recover access to all your servers in case a device is lost or stolen.
A user experience that is super seamless, flexible and just overall awesome.
Securely authenticate to embedded systems such as Armbian or Raspbian.
Our zero knowledge solution does not store any PII about users, however we can provide access log details that when combined in your identity or user management will allow you to create an audit trail of past actions. Coming soon the audit trail will make use of our existing blockchain infrastructure to become immutable.