GLPI Passwordless MFA

Contact an Expert
Secret Double Octopus logo - white
Plus icon
glpi-white-logo - secret double octopsu

With Secret Double Octopus, developers and support staff can access GLPI using a high-assurance, password-free authenticator instead of passwords.

To login to GLPI, users simply tap the Octopus Authenticator on their mobile device. The Octopus Authenticator implements provably unbreakable cryptography that is highly resistant to common attacks such as phishing, MitM and cracking. Octopus Authentication was built for enterprise customers, which means it is fully integrated with Microsoft Active Directory and supports access to all enterprise resources, whether on-premise, remotely accessed or in the cloud.

Why Octopus

A Scalable Solution

Password management inhibits growth. Mass-market demands and large IT environments, involve enormous operational costs when delivered alongside conventional authentication. By eliminating the need to manage passwords, our platform drastically reduces cost and enables scalability.

Why Octopus

Frustration-free UX

Password-free security isn’t just about removing vulnerabilities. Our authentication platform is designed so anybody can use it – to be seamless, intuitive, and unobtrusive. It’s comprehensive security that’s hidden from the user. No typing of codes and no SMS.

Why Octopus

Mobile Push Authentication

Mobiles have become essential to user-friendly authentication, and our platform runs on both Android and iOS. Beyond the authentication process, it demands little of the user. Secure, but ultimately friendly.

What They Say

“Extra-secure, but simple, keyless authentication services”

salesforce-color- logo -secret double octopus

“Not only match but exceed, the level of protection afforded by conventional cryptography”

salesforce-color- logo -secret double octopus

“Password-free authentication, including Windows PC, network login, and access to applications.”

salesforce-color- logo -secret double octopus

Learn more about Secret Double Octopus Authentication

How It Works

We’re combining unique technologies on both sides of the authentication equation: protecting user identity, and seamlessly integrating authentication to systems inside the domain. Underpinning our high-assurance, password-free authentication solution are the secret sharing algorithms.

Authentication Flow - Secret Double Octopus