Risk-based access

As the number of threats is rising, organizations need to step up their efforts in only allowing those users access that are verified. Risk-based access provides an extra level of security by analyzing user behavior and requiring extra information when necessary.
MFA Windows Logon

Ask users to use TrustBuilder.io Mobile Authenticator to log on to their Windows PC or shared workstation. Enhance security by adding multi-factor authentication. Manage all possible access scenarios and configurations. Workstations are one of the most sensitive items in IT security, so increase security by offering users TrustBuilder MFA for Windows Logon.
Access orchestration

Orchestration is at the heart of any Identity and Access Management (IAM) system. All requests for access to applications or resources pass through the orchestrator. This allows us to provide a seamless user experience as far as identity, authentication and access control is concerned.
Adaptive authentication

Combine a friction-free user experience with optimal security. Offer your user the authentication solution that suits their phase in the customer journey and takes into account their location, device reputation or the value of a transaction.
Contextual authentication

Understand the context (IP address, time, locationā¦) of the user. Take that context into account before granting them access to resources or applications. Adapt the security policy that you apply to the context and the sensitivity of the data users want to access. Use the appropriate authentication method based on that context to reach the appropriate level of security without compromising customer experience. Allow passwordless authentication, Federated Identification and Single Sign-on to give users a basic level of access and apply adaptive authentication, but only when necessary.
Persona Selection

Allow your users to use just one profile for any persona they assume. Whether they want to connect as an employee, a customer, a partner, or an external contractor, let them use one profile rather than having to use different credentials, depending on their persona. Reduce administrative costs by switching from role-based access control to a policy-based approach.
Consent management

Ask users for consent to store and share their data. Allow users to give and revoke consent upon onboarding. Make it easy for users to manage their own consent in a self-service portal. Give users control over their data: allow them to decide what personal data are stored in your user database and what attributes are shared with Identity Providers (IdPs) and applications. As a European IAM vendor, TrustBuilder attaches great importance to compliance with all privacy regulations, both European and local regulations, throughout the consent lifecycle.
Delegated administration

Provide your users with the ability to delegate some of their responsibilities to another user. Make it easy for them to give temporary access to specific resources to their colleagues when they are on vacation or off sick, for instance, the approval of holiday requests or expense notes. Empower users to manage their own attributes and personas. Delegating administration to the people themselves stimulates timeliness, accuracy, and appropriateness and reduces the need for periodic proof. Unburden sysadmins by allowing users to manage delegation.
Self-Service

Allow users to use a third party as an Identity Provider. Let users move between systems quickly and securely, enhancing customer experience. Improve security and ease administration by trusting the identity credentials assured by a partner company or domain.
Onboarding

Allow users to register their information as easily as possible, to make onboarding seamless. Store their contact details in whatever database you want to use and ensure privacy by letting users give and revoke consent. Use self-service mechanisms to empower consumers to keep their information up to date and manage their preferences.