- About Us
In this mobile-first era, you want to launch new apps quick and easy without worrying about security. The iWelcome Mobile SDK enables you to add secure and intelligent customer onboarding and authentication natively into your mobile apps. QR-codes, deep linking and push/swipe logins can easily be integrated.
Thanks to a simple API architecture, you will be able to connect advanced authentication to any app that is being launched or updated. Besides that, the SDK also allows to orchestrate customer journeys by changing registration, activation and progressive profiling flows.
iWelcome offers an advanced and secure authentication system to connect employees, partners, and customers to systems, applications and devices in a highly secure and easy way. Multi-Factor, Biometric, Step-Up and Passwordless Authentication through QR-codes and magic-links are performed at the touch of a button.
Higher security, user convenience and cutting-edge technology go hand-in-hand to generate a valuable addition to iWelcome's IDaaS platform.
Our mobile app has been designed to deliver the best user experience without compromising on security. You can use it as a simple authentication tool for consumer interaction, but we also recommend the app for step-up authentication to increase security in specific scenarios, for instance upon identity attribute changes or sensitive application actions.
Online interactions are never a one-way street. That’s why, besides authentication, the iWelcome Mobile SDK also helps to engage with users by delivering secure in-app communication and document & transaction signing.
The app is compliant with the requirements for advanced electronic signatures (eIDAS) and Strong Customer Authentication (PSD2).
No more passwords, no more usernames. Full support of mobile device biometrics. Simply put your finger or enter your pin. Unified authentication experience across all platforms and channels.
iWelcome provides modules for self-registration and self-management of devices, allowing users to
add and remove devices. This can include the verification/registration of certain user attributes:
Passwords on their own don't offer enough protection for data leaks. That's why we use a private key for authentication that never leaves the user’s device, i.e. it is not stored at the server nor sent over. This means that even if the server’s authentication database leaks, an adversary can not authenticate as one of the users. The software on the device handles the generation of public/private keys, for which it registers the public key at the Mobile Identity server and stores the private key. Note that we do not deploy a PKI and corresponding certificates; the Mobile Identity server keeps a list of registered public keys.
Next to the private keys (first factor – possession), the user needs to provide a second factor. This second factor is a single secret, which can be a PIN for the user to remember, a biometric like for instance a fingerprint, or coming from another device the user carries like for instance a smartwatch. To avoid bruteforce attacks on the mobile device, the secret is verified online and the iWelcome Mobile Identity server implements a lock-out mechanism based on the number of consecutive failed verifications. The verification is done in zero-knowledge, i.e., the Mobile Identity server never learns the secret. We thus achieve true two factor authentication: an adversary needs to compromise at least two out of three: the secret, the mobile device, the Mobile Identity server.
Keeping up with change and new technological developments is one of the basic challenges of cyber-security. A stronger Authentication/Identification mechanism is among the most preferred methods of increasing the security of new technologies. When it comes to adopting data security technologies, about half of security professionals support technologies such as Encryption, Multi-Factor Authentication and Hardware Security Modules.
Using more than one factor in the authentication process has made it possible for companies to secure critical information and increase their chances of meeting security goals. It uses a combination of independent credentials that increase its effectiveness.
The 3 main factors used in Multi-Factor Authentication are:
These three factors work together for creating the perfect mix for optimum security against cyber-attacks, and they shouldn't be ignored.
Multi-Factor Authentication is one of the data security developments that have been quietly waiting for their turn in the spotlight but is now becoming the new norm for companies that want to protect their digital assets. The MFA market is increasing, and is expected to spread across all industries, due to security concerns as well as its role in legislation compliance needs.
Passwordless authentication takes Multi-Factor Authentication one step further, by eliminating the risk posed by weak or reused passwords, while increasing user convenience. As the value of data is increasing, it is essential that companies which process sensitive data implement more sophisticated authentication methods.
iWelcome provides Multi-Factor Authentication through mobile authentication, using an authentication and authorisation system that is easily integrable with your existing apps and that increases the security of your digital properties without requiring users to remember any passwords.
1. Higher security
The authentication system that iWelcome provides increases the security of digital properties and is a radical increase in security and ease of use compared to the classic “username & password” system.
2. User convenience
Authentication is performed at the touch of a button, without requiring users to remember any passwords, hence eliminating the risk of lost or stolen credentials.
3 . Cutting-edge technology
We use best in class security protocols to ensure complete user privacy, and bring compliance to personal data security regulations closer.