IT security

Protecting key resources in an organization from accidental or intentional leaks is the cornerstone of security. By ensuring adequate IT security, it is possible to react even faster and detect impending threats.

Two-factor authentication

Two-factor authentication in the eAuditor system console enables additional security of user credentials during the login process. This results in the introduction of additional layers of authentication referred to as ePass. As a result, in addition to the standard way of logging in (providing an access element such as a login and password), which confirms the user’s credentials through the system for local accounts or AD DS./LDAP for domain accounts, authentication with physical hardware security is required.

How is the configuration of key authentication done? It is done by default and uses the HTTP protocol (unencrypted data transfer for the Internet). In addition, the configuration of encrypted HTTPS communication is required for two-factor authentication. As part of the implementation, IT administrators receive full support in generating the certificate and configuring Apache Tomcat 8.5.

Is eAuditor right for you?

Learn about eAuditor during a free presentation.