Modern Enterprise Authentication explained
A future-proof path to passwordless starting from MFA
The Octopus Blog
Our Insights into Authentication in the Passwordless era
Security and IT personnel are frequently targeted by malicious actors in order to steal credentials to their accounts, which typically hold the highest privileges within the domain.
Secret Double Octopus provides high-assurance passwordless authentication to any PAM platform, to keep your privileged users secure, without worrying about passwords, tokens and keys.
To access sensitive accounts, privileged users enter their username or other identifier, and the PAM-protected service will redirect the request to the domain’s PAM solution. The on-prem Octopus authentication server will then receive the authentication request and send a highly secure and interception-resistant push notification to the user’s smartphone. Once the user identifies and approves, the authentication server will return an approval to the PAM solution and simultaneously update the local Identity Provider (e.g. Active Directory).