Difference between revisions of "Cetbix MFA"
Line 2: | Line 2: | ||
=Cetbix Access Authenticator App= <!--T:1--> | =Cetbix Access Authenticator App= <!--T:1--> | ||
− | Cetbix provides its own Cetbix Access Authenticator app to enable secure multi-factor authentication (MFA) for user logins. | + | Cetbix provides its own Cetbix Access Authenticator app to enable secure multi-factor authentication (MFA) for user logins. It acts as a secure MFA solution for Cetbix-enabled accounts, providing push notifications and dynamic security codes during login. |
− | |||
− | |||
− | |||
− | |||
− | |||
Availability: | Availability: | ||
Line 14: | Line 9: | ||
==Key Features== | ==Key Features== | ||
− | 1. | + | 1. Push Notifications |
- Users receive real-time login approval requests on their mobile devices. | - Users receive real-time login approval requests on their mobile devices. | ||
- Requires user confirmation to authorize access, adding a critical second layer of security[1][6]. | - Requires user confirmation to authorize access, adding a critical second layer of security[1][6]. | ||
− | 2. | + | 2. Dynamic Security Codes |
- Generates time-sensitive, unique codes (similar to TOTP) that must be entered alongside standard credentials[1][4]. | - Generates time-sensitive, unique codes (similar to TOTP) that must be entered alongside standard credentials[1][4]. | ||
- Codes are regenerated periodically to prevent reuse or interception[1]. | - Codes are regenerated periodically to prevent reuse or interception[1]. | ||
− | 3. | + | 3. Rigid Authentication Mechanism |
- Implements strict security protocols to prevent unauthorized access, even if passwords are compromised[4][6]. | - Implements strict security protocols to prevent unauthorized access, even if passwords are compromised[4][6]. | ||
- No sensitive data (e.g., financial information) is stored or collected by the app[3][6]. | - No sensitive data (e.g., financial information) is stored or collected by the app[3][6]. | ||
− | 4. | + | 4. Privacy-Focused |
− | - | + | - No data collection: The app explicitly states it does not collect user data[1][6]. |
− | - | + | - TLS encryption: Ensures secure communication between the app and Cetbix servers[3]. |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | ==How It Works== | |
+ | 1. Login Initiation: A user enters their username and password on the Cetbix login page[9]. | ||
+ | 2. MFA Trigger: Cetbix sends a push notification or generates a security code via the authenticator app. | ||
+ | 3. User Approval: The user approves the login request or enters the dynamic code. | ||
+ | 4. Access Granted: Upon successful authentication, the user gains entry to the Cetbix platform[1][6]. | ||
− | |||
− | + | ==Security Measures== | |
− | + | 1. TLS Encryption: Protects data in transit between the app and Cetbix systems[3]. | |
− | + | 2. No Local Storage: Sensitive credentials or codes are not stored on the device[6]. | |
− | + | 3. Compliance: Aligns with modern security standards, though specific certifications are not listed in app details[1][3]. | |
− | |||
− | |||
− | |||
− | |||
− | + | The Cetbix Access Authenticator app provides a secure, privacy-conscious MFA solution tailored for Cetbix users, combining push notifications and dynamic codes to enhance login security. | |
Citations: | Citations: |
Revision as of 14:21, 19 April 2025
Cetbix Access Authenticator App
Cetbix provides its own Cetbix Access Authenticator app to enable secure multi-factor authentication (MFA) for user logins. It acts as a secure MFA solution for Cetbix-enabled accounts, providing push notifications and dynamic security codes during login.
Availability:
- Android: [Available on Google Play](https://play.google.com/store/apps/details?id=com.cetbix.appnotification)[1] - iOS: [Available on the App Store](https://apps.apple.com/gt/app/cetbix-access-authenticator/id1621293327)[2][6]
Key Features
1. Push Notifications
- Users receive real-time login approval requests on their mobile devices. - Requires user confirmation to authorize access, adding a critical second layer of security[1][6].
2. Dynamic Security Codes
- Generates time-sensitive, unique codes (similar to TOTP) that must be entered alongside standard credentials[1][4]. - Codes are regenerated periodically to prevent reuse or interception[1].
3. Rigid Authentication Mechanism
- Implements strict security protocols to prevent unauthorized access, even if passwords are compromised[4][6]. - No sensitive data (e.g., financial information) is stored or collected by the app[3][6].
4. Privacy-Focused
- No data collection: The app explicitly states it does not collect user data[1][6]. - TLS encryption: Ensures secure communication between the app and Cetbix servers[3].
How It Works
1. Login Initiation: A user enters their username and password on the Cetbix login page[9]. 2. MFA Trigger: Cetbix sends a push notification or generates a security code via the authenticator app. 3. User Approval: The user approves the login request or enters the dynamic code. 4. Access Granted: Upon successful authentication, the user gains entry to the Cetbix platform[1][6].
Security Measures
1. TLS Encryption: Protects data in transit between the app and Cetbix systems[3]. 2. No Local Storage: Sensitive credentials or codes are not stored on the device[6]. 3. Compliance: Aligns with modern security standards, though specific certifications are not listed in app details[1][3].
The Cetbix Access Authenticator app provides a secure, privacy-conscious MFA solution tailored for Cetbix users, combining push notifications and dynamic codes to enhance login security.
Citations: [1] https://play.google.com/store/apps/details?id=com.cetbix.appnotification [2] https://apps.apple.com/gt/app/cetbix-access-authenticator/id1621293327 [3] https://www.cetbix.com/contents/technicalorganizationmeasures [4] https://apps.apple.com/tr/app/cetbix-access-authenticator/id1621293327?l=tr [5] https://www.cetbix.com/products/cetbixismssoftware [6] https://apps.apple.com/my/app/cetbix-access-authenticator/id1621293327 [7] https://wikki.cetbix.net/index.php?title=ABOUT_CETBIX_ISMS [9] https://www.cetbix.com/signin.php