Back to the main page
New: Oracle Mobile Authenticator Dramatically Simplifies Two-Factor Authentication
The deployment of cloud-based applications requires a cost-effective authentication solution to complement user names and passwords. In April 2014, Oracle launched Oracle Mobile Authenticator, a token-based authentication application that turns a personal phone or tablet into a second-factor authentication device—eliminating the cost and complexity of managing physical tokens or smart cards. Oracle Mobile Authenticator provides strong authentication without the inconvenience of distributing an additional device.
Oracle Mobile Authenticator is available for download from Apple's iTunes App Store and Google Play.
(Note that terms, conditions, and restrictions apply.)
Oracle Mobile Authenticator generates time-based security codes and provides the corresponding service that enables applications to accept a soft token authentication. The result: IT organizations can enhance security in a highly cost-effective way while giving their workforce and customers the freedom to use their preferred personal device.
The new offering also supports a wide range of second factors at no additional cost, including soft token generation, Google Authenticator, and behavior-based access.
"This solution makes sense in today's business landscape. It harnesses mobile devices, which have become an extension of a user's identity, to provide a simple and powerful solution to address growing digital security risks," says Amit Jasuja, senior vice president of Java and Identity Management, Oracle.
Multifactor Security with the Power of Single Sign-On
Oracle Mobile Authenticator integrates seamlessly with Oracle Access Management solutions, which can be quickly configured to perform multifactor challenges for sensitive applications, data, and web services. After the first challenge—most often username- and password-based—users are asked for a one-time password generated by Oracle Mobile Authenticator.
"Our approach allows you to implement strong authentication more quickly and cost-effectively, because it's an extension of the same access management infrastructure you would use for single sign-on (SSO) to your enterprise or cloud applications, fraud detection, token management, and super-user access control," says Jasuja.
Weak passwords continue to create risks for many online applications. As many as 35 percent of organizations still don't evaluate security when adopting cloud solutions. Allowing users to combine something they have—their mobile device—with something they know—their password—provides an easy and convenient way to enable productivity and increase security.
Oracle's vision is a single access management suite for enterprise cloud and mobile computing. A single integrated solution provides the lowest cost of ownership, allowing organizations to adopt capabilities incrementally as security requirements change.
Learn more about Oracle Mobile Authenticator.
This content is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle's products remains at the sole discretion of Oracle.