Skip Headers
Oracle® Adaptive Access Manager Concepts
Release 10g (10.1.4.5)

Part Number E12049-03
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

2 Adaptive Strong Authenticator

Common authentication methods today have many weaknesses:

Oracle Adaptive Access Manager's Adaptive Strong Authenticator was designed specifically to overcome these limitations.

Leveraging a soft, two-factor authentication solution, Adaptive Strong Authenticator provides fraud protection against online identity theft. It does so by encrypting credential data inputs at the point of entry. This ensures maximum user protection because information never resides on a user's computer nor does information reside anywhere on the Internet where it can be vulnerable to theft.

2.1 Protecting Corporations and Their Customers

As corporations embrace the Internet, they must ensure that customer transactions and data are safe. Adaptive Strong Authenticator enables corporations to deploy a highly effective security solution that offers their customers the required protection as well as the ease-of-use needed to engage in and grow online relationships.

Adaptive Strong Authenticator is hardware- and software-independent and does not rely upon cached data. End-users can invoke the authentication process from any browser, over any network (public, private, Wi-Fi, and kiosk). They can also use any user touch-point to protect their information during session initiation or during in-session transactions.

Low Cost of Ownership

An added benefit of Adaptive Strong Authenticator is that it offers a low cost of ownership. This is in comparison to other authentication alternatives. The solution does not require any special databases, proprietary software, extra hardware, or third-party servers. Furthermore, there are no customer support needs to consider associated with lost or damaged cards and tokens.

Using Adaptive Strong Authenticator, corporations can defend their customers and their data against the most potent fraudulent attacks.

Table 2-1 Potent Fraudulent Attacks

Attack Defense

Phishing Environment

The PIN data required to authenticate only exists in a form understood by the user and the server. Therefore, it can't be interpreted and used for fraud. An impostor Internet site cannot simulate the operational aspects of the authentication.

Phishing (Social Engineering)

Equipping end-users with their own personalized device is the first step. Ensuring Adaptive Strong Authenticator is used for entry of all sensitive credentials (password, PIN, challenge questions, and others) is the second. Finally, Adaptive Risk Manager prevents the fraudulent use of credentials if end-users have fallen prey to phishing.

Trojan Viruses

Adaptive Strong Authenticator foils keyboard, mouse-click, and screen-capture loggers; cookie hijackers; "over the shoulder" spies; and all other forms of known attacks. This is because no sensitive data is entered using the keyboard, mouse, or cookies nor is any sensitive data handled by the browser.

Fraudulent Transactions

Adaptive Risk Manager collects and evaluates end-user data points. These data points can be used to authorize, challenge, deny, or put online transactions on hold.

Password Theft

Adaptive Strong Authenticator generates a unique set of random data for every user session. It is virtually difficult for a password to be guessed and reused.


2.2 Comprehensive Features and Functionality

Adaptive Strong Authenticator is an enterprise-licensed platform that includes a number of user interfaces. These interfaces are for managing fraud and identity theft protection. Whether making payments, accessing sensitive documents, entering passwords, or answering challenge questions, users and data are protected.

2.2.1 QuestionPad

QuestionPad takes data entry to another security level. With challenge questions becoming more commonly used in financial institutions and other enterprises, it opens up another target for fraudsters. QuestionPad addresses this issue by changing the way users enter these new credentials.

This illustration shows the QuestionPad

QuestionPad offer several deployment options. Oracle can host the challenge questions and provide the question bank. Alternatively, the question bank can be integrated with internal customer information databases. They can also be integrated with external third-party question providers.

2.2.2 PinPad and KeyPad

PinPad is an authentication entry device used to enter a numeric PIN. It can be invoked at the time of login or transaction.

This illustration shows a PinPad

KeyPad is a configurable virtual keyboard. It can be used to enter alphanumeric and special characters found on a traditional keyboard. That makes it ideal for entering passwords and other sensitive alphanumeric information.

This illustration shows the KeyPad

2.2.3 TextPad

TextPad is a personalized device for entering a password or PIN using a regular keyboard. This method of data entry helps to defend against phishing.

This illustration shows a TextPad

2.3 Deployment Options

Two deployment options are available:

2.3.1 Without Oracle Adaptive Access Manager Web Application

With this deployment approach, the client stores all credentials. The client also uses the Adaptive Strong Authenticator library only for encoding and decoding inputs.

2.3.2 With Oracle Adaptive Access Manager Web Application

With this deployment approach, customers can configure their own Web interface. They do this by leveraging packaged Web pages and flows from Oracle. These pages and flows can then be altered to meet corporate branding requirements.