Home
OneSpan
Trust Center
Forum
Login
English
English
French
Ask Ozzy
Contents
x
Welcome to our new Documentation Portal!
Authentication Server
Authentication Suite
Intelligent Adaptive Authentication
Mobile Application Shielding
Mobile Authenticator Studio
Mobile Security Suite
OneSpan Cloud Authentication
OneSpan Identity Verification
OneSpan Risk Analytics
OneSpan Sign
Global Solution Demos
Batch 19
Powered by
Integration
18 Articles
in this category
Share this
Share
Dark
Light
Contents
Integration
18 Articles
in this category
Share
Dark
Light
Overview of the Intelligent Adaptive Authentication Integration
With Intelligent Adaptive Authentication you can integrate user registration, authenticator activation, and flows with remote authentication performed by a trusted device. Such a trusted device is a mobile application with an integration of the One...
Updated on : 28 Oct 2024
Integration of the Registration and Deregistration of a FIDO-Based Authenticator
Before you can use FIDO-based authentication for OneSpan Cloud Authentication, a FIDO authenticator must be registered for the UAF or FIDO2 protocol. For information about deregistration and authenticator management, see Management of FIDO authent...
Updated on : 29 Oct 2024
Integration of User Registration and Authenticator Activation Using Orchestration
Before the user can use Intelligent Adaptive Authentication, they must complete the registration process and activate their authenticator. Once the device is activated, it can be used for login, event, and transaction data signing operations. User ...
Updated on : 25 Oct 2024
Integration of Provisioning for Multi-Device Licensing Authenticators
Intelligent Adaptive Authentication supports offline and online provisioning to activate a multi-device licensing (MDL) authenticator. Offline MDL authenticator provisioning For offline MDL authenticator provisioning, the integration method depend...
Updated on : 21 Oct 2024
Integration of Offline User Registration and Authenticator Activation
This type of registration is used to activate an authenticator that supports Cronto (e.g. the Digipass 7xx series). Once the device is activated, it can be used to generate a one-time password (OTP) to log in or a signature for transaction validat...
Updated on : 21 Oct 2024
Integrating User Login and Event Validation with Static Password
With OneSpan Intelligent Adaptive Authentication you can implement functionality for your users to log in to your web application and validate events using a static password during the grace period or in concurrence with other one-time password (OTP...
Updated on : 21 Oct 2024
Integration of User Login and Event Validation with one-time password (OTP)
Intelligent Adaptive Authentication enables users to login to your web application and validate events by generating an one-time password (OTP). An authenticator (hardware or software) that supports the generation of Response-Only- or 1-step Challen...
Updated on : 21 Oct 2024
Integration of User Login and Event Validation with Challenge/Response
With Intelligent Adaptive Authentication you can implement functionality for your users to log in to your web application and validate events via Challenge/Response authentication.. This can also be combined with other types of one-time password (OT...
Updated on : 21 Oct 2024
Integration of User Login and Event Validation via Notification
With OneSpan Intelligent Adaptive Authentication you can implement functionality for your users to log in to your web application and request remote strong authentication. Remote authentication is performed by a trusted device where the appropriate...
Updated on : 28 Oct 2024
Integrating User Login with Secure Channel
Secure Channel-based authentication is a type of authentication which supports the secure exchange of authentication data. It is used in combination with Cronto images or QR codes to exchange the Secure Channel messages. This type of authentication ...
Updated on : 21 Oct 2024
Integration of Adaptive User Login with FIDO-Based Authentication
With OneSpan Intelligent Adaptive Authentication you can implement functionality for your users to log in to your web application using the passwordless FIDO-based authentication mechanism. Intelligent Adaptive Authentication supports the following ...
Updated on : 21 Oct 2024
Integration of Offline Transaction Data Signing
With Intelligent Adaptive Authentication, your users can sign their transaction data offline. To integrate offline transaction data signing Issue a transaction request with the POST /users/{userid@domain}/transactions/validate endpoint: ...
Updated on : 21 Oct 2024
Integration of Push Notification-Based Transaction Data Signing
Push Notification-based transaction data signing (TDS) is a method to validate transactions. It uses a push mode to enable any activated Mobile Security Suite Orchestration SDK application on a mobile device. This serves to generate a signature...
Updated on : 21 Oct 2024
Integration of Secure Channel-Based Transaction Data Signing
Secure Channel-based transaction data signing (TDS) is a type of transaction data signing that supports the secure exchange of signing data. Secure Channel-based TDS is typically used in combination with Cronto images or QR codes to exchange the Sec...
Updated on : 21 Oct 2024
Integration of Adaptive Message-Based Transaction Data Signing
Adaptive message-based transaction data signing is a type of transaction data signing that supports virtual signatures that are sent via email, SMS, or voice delivery to a mobile device. A virtual signature consists of a one-time password (OTP) and ...
Updated on : 21 Oct 2024
Integration of Adaptive Transaction Data Signing with FIDO-Based Transaction Validation
Intelligent Adaptive Authentication supports the FIDO UAF protocol for adaptive transaction data signing secured with FIDO-based transaction validation. Prerequisites for securing adaptive transaction data signing with FIDO-based transaction valida...
Updated on : 21 Oct 2024
Integration of Orchestration with OneSpan Mobile Security Suite
The Orchestration SDK enables you to easily leverage major security features in your mobile application: Two-factor authentication Secure provisioning Secure Channel Secure storage Password protection Fingerprint recognition ...
Updated on : 28 Oct 2024
Challenges of the Risk Management Component
Intelligent Adaptive Authentication with the Risk Management component can challenge the user in multiple aspects during login and adaptive authentication, event validation, or transaction activities. Risk Management component challenges When Inte...
Updated on : 18 Oct 2024
Change password!
Changing your password will log you out immediately. Use the new password to log back in.
Current password
Current password is required
New password
New password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password
Confirm password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password should be same as new password
Update
Change profile
Success!
First Name
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last Name
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
New email
Enter a valid email
Re-enter your password
Enter a valid password
Your profile has been successfully updated.
Update
Logout
ENTER
ESC
Ozzy, our interactive help assistant
Search Limit Exceeded. Please upgrade the plan.
Answer copied!
No results found
Provide more context or information so that I can better understand and assist you