Skip to main content

banner-public-docs

Overview of Authentication Methods (Verification)

The physical verification process, as an authentication factor, is designed to verify the physical identity of a person. This verification becomes vital from a security perspective, since it validates the existence of the person.

There are basically three categories identified as authentication factors for physical verification.

Something that is,

  • known by you; i.e. Password, Pin, Pattern, TOTP.
  • possessed by you; i.e. Smartphone, Smartcard, USB token, or any other hardware key.
  • physically unique to you; i.e. Face, Voice, Fingerprint.

Based on the above categories, there is a range of potential requirements that can be used to verify physical identity and authenticate access to websites, applications, networks, systems, and other types of secured services.

The list of authentication mechanisms used by cidaas to verify physical identity is shown below:

Physical indentity

About MFA's

The following sections will take you through all the exclusive and secure physical verification methods offered by cidaas, with their details of configuration and usage. Here, we will also help you with the sign-up procedure and equip you with details on the mobile application's usage.

To start using the secure services of the cidaas authenticator, you will need to have a registered account with cidaas.

cidaas Authentication mechanismDescriptionEnrollmentAuthentication
EmailYou enter the code sent to your registered email address.How to configure EmailHow to use Email
Magic LinkThe application sends a so-called Magic Link and keeps polling as long as the user successfully clicked on the link that was sent to the mail account. When this succeeds and the status switches to Verified, it can continue the authentication processHow to configure Magic LinkHow to use Magic Link
Text messageIdentification via a code that is sent to your phone via SMS.How to configure Text messageHow to use Text message
FIDO2/Passkeys/FIDO U2FThis standard uses a private and public key to validate your identity.How to configure FIDOHow to use FIDO
TOTP VerificationTime-based One-time Password (TOTP) is a temporary passcode (six- or eight-digit) generated by an algorithm, used for authentication based on your time and device.How to configure TOTPHow to use TOTP
Smart Push notificationTechnique that uses the push notification feature of a mobile device and prompts you to choose the right code (as displayed on the web app) among a set of codesHow to configure pushHow to use push
Touch ID RecognitionBiometric procedure to verify identity that is based on fingerprintHow to configure touch-idHow to use touch-id
Pattern RecognitionIdentity verification that requires you to confirm a pattern, like those commonly used in mobile lock patterns.How to configure patternHow to use pattern
IVR RecognitionYou enter the code that is prompted via a phone call as proof of your identity.How to configure IVRHow to use IVR
Backup CodeAn 8-digit backup code can be used to sign in to your account.How to configure Backup-codeHow to use Backup-code
Face RecognitionIdentity verification using advanced biometric methods where the face is uniquely identified.How to configure face-recognitionHow to use face-recognition

Need Support?

Please contact us directly on our support page.