Multi-factor Authentication

We protect your data with smart and adaptive MFA techniques

Powerful multi-factor authentication capabilities are an absolute necessity for businesses in today’s digital environment. Relying on plain username/password access to protect your cloud ERP systems from unauthorized access elevates security risks to a critical level as these credentials can be easily compromised.

Advanced MFA features by gotomyerp grant strong and durable protection against unauthorized access 

A large variety of MFA methods 

gotomyerp’s hosting platform gives total control over the authentication process to the customer, allowing you to choose the most convenient MFA implementation approach. Our platform offers a rich selection of the most effective methods that can be implemented as part of the multi-factor authentication process. 

MFA-secured access can be implemented through a combination of many diverse factors used by the system to decide whether a user should be granted the access. 

Knowledge-based authentication

Knowledge-based authentication

Users are asked to provide private information to login, such as credentials, answers to secret questions, pin code, etc.

Possession-based authentication

Possession-based authentication

Users have to prove their identities via devices or digital assets owned by them. Secret codes required for access can be sent to mobile phones, email, authentication apps, etc.

Biometric authentication

Biometric authentication

Users are identified by scanning a sample of their unique biometric features. Biometric authentication may be done through fingerprint scans, voice or facial recognition, etc.

Smart adaptive MFA technology

Gotomyerp relies on smart AI-based MFA technologies used to enhance security with business rules and information about user behavior patterns. The system adapts the authentication process and balances login requirements based on relevant user information. 

Adaptive MFA may rely on dynamic user details such as:

  • IP address
  • Failed login attempts
  • Geographical location
  • Operating system/device platform
  • Time of day
  • User role