Skip to main content

Providing certificates and solutions to protect access to hardware and software applications

Two-factor authentication (2FA) is term that is becoming widely recognized to define a higher level of security that is required to protect access to systems, PCs and laptops and to protect secure website applications.

Typically, the use of two-factor authentication is used to replace traditional user name and password methodology.  In order to accomplish two-factor authentication, you must purchase a certificate that is stored in a hardware device such as a smartcard or a USB token.

Use an IdenTrust TrustID® certificate for personal or business processes when government interoperability is not required.

Use a government trusted DoD ECA or an IdenTrust Federal Bridge Certified IGC certificate when government interoperability is needed.

Select a TrustID® hardware certificate to protect your data and PC or laptop

Understanding Two-Factor Authentication

Understanding Two-Factor Authentication

Learn about how two-factor authentication provides stronger and more reliable protection for systems and data

Learn More
Publicly Trusted Two-Factor Authentication

Publicly Trusted Two-Factor Authentication

Use hardware-based certificates to login in to your PC, protecting access to business and personal information

Learn More
Government Trusted Two-Factor Authentication

Government Trusted Two-Factor Authentication

Use hardware-based certificates to access secure government agency web sites

Learn More
Enabling Applications for Two-Factor Authentication

Enabling Applications for Two-Factor Authentication

Let us assist you in defining a solution using two-factor authentication to achieve enhanced security

Learn More

Enable Strong Authentication Using Hardware-Based Certificates

Two-Factor Authentication

Use two-factor authentication to enhance security, by replacing traditional user name and password methodology. Two-factor authentication can be accomplished by using an certificate that is stored in a hardware device (i.e., smart card or USB token). The certificate cannot be accessed without providing the hardware password, known only to the individual who has possession of the hardware and who is the subscriber named in the digital certificate.

In order to use two-factor authentication to access a secure application, that application must be “PKI-enabled”. To learn more about using two-factor authentication to secure your systems and processes, please contact us at Sales@IdenTrust.com or call 1 (866) 763-3346.

Certificate Management Center

Use our Certificate Management Center (CMC) to manage and renew your current IdenTrust certificate!