Providing certificates and solutions to protect access to hardware and software applications
Two-factor authentication (2FA) is term that is becoming widely recognized to define a higher level of security that is required to protect access to systems, PCs and laptops and to protect secure website applications.
Typically, the use of two-factor authentication is used to replace traditional user name and password methodology. In order to accomplish two-factor authentication, you must purchase a certificate that is stored in a hardware device such as a smartcard or a USB token.
Use an IdenTrust TrustID® certificate for personal or business processes when government interoperability is not required.
Use a government trusted DoD ECA or an IdenTrust Federal Bridge Certified IGC certificate when government interoperability is needed.
Select a TrustID® hardware certificate to protect your data and PC or laptop
Enable Strong Authentication Using Hardware-Based Certificates
Use two-factor authentication to enhance security, by replacing traditional user name and password methodology. Two-factor authentication can be accomplished by using an certificate that is stored in a hardware device (i.e., smart card or USB token). The certificate cannot be accessed without providing the hardware password, known only to the individual who has possession of the hardware and who is the subscriber named in the digital certificate.
In order to use two-factor authentication to access a secure application, that application must be “PKI-enabled”. To learn more about using two-factor authentication to secure your systems and processes, please contact us at Sales@IdenTrust.com or call 1 (866) 763-3346.
Certificate Management Center
Use our Certificate Management Center (CMC) to manage and renew your current IdenTrust certificate!