How does Deepnet Authentication actually work ?
There are many applications and authentication methods available depending on your requirements – but at a basic level it works like this; • Customer installs Deepnet Authentication “server” software. • Customer decides which application they wish to authenticate to occur. For example lets say Outlook Web Access (OWA). • Following simple instructions provided configure OWA to require authentication. • Customer decides which form of tokens they wish to issue – for example again lets say you wish to issue “One Time Password” tokens via SMS to their mobile phone. • In the Deepnet Authentication “server” software, you create a user, set up their details and enter their mobile number. • End user goes to the OWA server and tries to logon. Customer enters their username and password, and is presented with a button to send a OTP (one time password) via SMS. • In a few seconds an SMS is received by the end users mobile phone which they enter into the logon screen, authorised and logon to OWA pr