Reliable Identity Proofing
on the Web
Authentication is the procedure used to check whether you are the person you claim to be.
Authentication mechanisms in computer systems can take on many different forms. The best known of these is the combination of username and password. You can use a specific username to access a system if you know the correct password for this specific username.
MFA (multi-factor authentication) is conceptually a part of the comprehensive topic of authentication, in the same way as adaptive authentication and risk-based authentication.
Something that only the user knows:
Something that only the user has (token):
Something that only the user is:
Passive behavioural biometrics:
Context-specific data:
Selected security questions:
Modular Authentication Service
Nevis supports many authentication mechanisms. However, these are rarely used in isolation. They are often combined for greater security or used in parallel for different user groups or application scenarios. Some examples:
(OTP / one-time code that is sent to the user’s mobile phone) – something that only the user possesses (the code is a digital token)
Thanks to the authentication engine, you can combine the authentication and federation mechanisms supported by Nevis:
FIDO Authentication with Passkeys
Passkeys, combined with Nevis, stand for strong authentication, where a user uses a unique key instead of a password to verify their identity. See our blog post for more information on the passwordless future with Passkeys.
During the login, Nevis automatically collects and analyses different signals from the current user context – for example:
Based on these different inputs for every authentication, Nevis continuously creates a risk profile for the user. React to specific events and risk scenarios – for example, a login from a new device or an impossible journey (a login within a few hours from Berlin as well as from San Francisco) – and decide whether to notify the user or provide additional means of authentication with the help of multi-factor authentication.
In addition to the sophisticated and advanced Nevis risk profiling, which can be coordinated down to the finest detail to your specific application scenarios, we have also developed a slightly simpler yet highly effective rule-based risk engine.
Simply choose from a range of predefined events and specify the required behaviour to be triggered using «if-then» rules, and you’re all set.
Nevis gives you complete freedom to configure your adaptive risk engine as you see fit. You can decide which of the context-based and/or time signals the risk engine should take into consideration and how these signals are weighted. You specify which threshold values are defined and which actions to trigger if an authentication attempt is flagged as risky.
Adaptive authentication is based on different user signals in order to detect suspicious authentication attempts. One of these signals is based on a fingerprint from the user device. To strike a balance between accuracy and stability, we’ve implemented a procedure with multiple fingerprints in our adaptive authentication solution. Multiple fingerprints improve the detection of suspicious authentication attempts and reduce the number of false-positive results. Both help bring about a better customer experience.
Strong passwordless authentication, for instance, using FaceID or fingerprint is extremely secure and FIDO2-compliant thanks to cryptographic key pairings.
Reduce the incidence of fraud by up to 99 per cent and prevent the use of stolen login data to attack web applications.
Prevent identity theft and the reputational damage caused by data theft.
Support requests and password problems are eliminated. Your IT employees can focus on other more important tasks.
Expensive transaction charges for SMS-TAN are no more.
Customers expect user-friendliness and security. The login process must be quick, convenient and intuitive.
A seamless customer experience ensures a low cancellation rate during the login process.
Enhance the user experience with ease of operation and logins on mobile devices.