Difference between revisions of "Cetbix MFA"
(5 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | + | =Cetbix Access Authenticator App= <!--T:1--> | |
− | Cetbix provides its own | + | Cetbix provides its own Cetbix Access Authenticator app to enable secure multi-factor authentication (MFA) for user logins. It acts as a secure MFA solution for Cetbix-enabled accounts, providing push notifications and dynamic security codes during login. |
− | --- | + | Availability: |
+ | - Android: [Available on Google Play](https://play.google.com/store/apps/details?id=com.cetbix.appnotification)[1] | ||
+ | - iOS: [Available on the App Store](https://apps.apple.com/gt/app/cetbix-access-authenticator/id1621293327)[2][6] | ||
− | + | ==Key Features== | |
− | + | 1. Push Notifications | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | 1. | ||
- Users receive real-time login approval requests on their mobile devices. | - Users receive real-time login approval requests on their mobile devices. | ||
- Requires user confirmation to authorize access, adding a critical second layer of security[1][6]. | - Requires user confirmation to authorize access, adding a critical second layer of security[1][6]. | ||
− | 2. | + | 2. Dynamic Security Codes |
- Generates time-sensitive, unique codes (similar to TOTP) that must be entered alongside standard credentials[1][4]. | - Generates time-sensitive, unique codes (similar to TOTP) that must be entered alongside standard credentials[1][4]. | ||
- Codes are regenerated periodically to prevent reuse or interception[1]. | - Codes are regenerated periodically to prevent reuse or interception[1]. | ||
− | 3. | + | 3. Rigid Authentication Mechanism |
- Implements strict security protocols to prevent unauthorized access, even if passwords are compromised[4][6]. | - Implements strict security protocols to prevent unauthorized access, even if passwords are compromised[4][6]. | ||
- No sensitive data (e.g., financial information) is stored or collected by the app[3][6]. | - No sensitive data (e.g., financial information) is stored or collected by the app[3][6]. | ||
− | 4. | + | 4. Privacy-Focused |
− | - | + | - No data collection: The app explicitly states it does not collect user data[1][6]. |
− | - | + | - TLS encryption: Ensures secure communication between the app and Cetbix servers[3]. |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | ==How It Works== | |
+ | 1. Login Initiation: A user enters their username and password on the Cetbix login page[9]. | ||
+ | 2. MFA Trigger: Cetbix sends a push notification or generates a security code via the authenticator app. | ||
+ | 3. User Approval: The user approves the login request or enters the dynamic code. | ||
+ | 4. Access Granted: Upon successful authentication, the user gains entry to the Cetbix platform[1][6]. | ||
− | |||
− | + | ==Security Measures== | |
− | + | 1. TLS Encryption: Protects data in transit between the app and Cetbix systems[3]. | |
− | + | 2. No Local Storage: Sensitive credentials or codes are not stored on the device[6]. | |
− | + | 3. Compliance: Aligns with modern security standards, though specific certifications are not listed in app details[1][3]. | |
− | |||
− | |||
− | |||
− | |||
− | + | The Cetbix Access Authenticator app provides a secure, privacy-conscious MFA solution tailored for Cetbix users, combining push notifications and dynamic codes to enhance login security. | |
− | Citations | + | ==Citations== |
− | [1] https://play.google.com/store/apps/details?id=com.cetbix.appnotification | + | *[1] https://play.google.com/store/apps/details?id=com.cetbix.appnotification |
− | [2] https://apps.apple.com/gt/app/cetbix-access-authenticator/id1621293327 | + | *[2] https://apps.apple.com/gt/app/cetbix-access-authenticator/id1621293327 |
− | [3] https://www.cetbix.com/contents/technicalorganizationmeasures | + | *[3] https://www.cetbix.com/contents/technicalorganizationmeasures |
− | [4] https://apps.apple.com/tr/app/cetbix-access-authenticator/id1621293327?l=tr | + | *[4] https://apps.apple.com/tr/app/cetbix-access-authenticator/id1621293327?l=tr |
− | [5] https://www.cetbix.com/products/cetbixismssoftware | + | *[5] https://www.cetbix.com/products/cetbixismssoftware |
− | [6] https://apps.apple.com/my/app/cetbix-access-authenticator/id1621293327 | + | *[6] https://apps.apple.com/my/app/cetbix-access-authenticator/id1621293327 |
− | [7] https://wikki.cetbix.net/index.php?title=ABOUT_CETBIX_ISMS | + | *[7] https://wikki.cetbix.net/index.php?title=ABOUT_CETBIX_ISMS |
− | [9] https://www.cetbix.com/signin.php | + | *[9] https://www.cetbix.com/signin.php |
Latest revision as of 14:23, 19 April 2025
Contents
Cetbix Access Authenticator App
Cetbix provides its own Cetbix Access Authenticator app to enable secure multi-factor authentication (MFA) for user logins. It acts as a secure MFA solution for Cetbix-enabled accounts, providing push notifications and dynamic security codes during login.
Availability:
- Android: [Available on Google Play](https://play.google.com/store/apps/details?id=com.cetbix.appnotification)[1] - iOS: [Available on the App Store](https://apps.apple.com/gt/app/cetbix-access-authenticator/id1621293327)[2][6]
Key Features
1. Push Notifications
- Users receive real-time login approval requests on their mobile devices. - Requires user confirmation to authorize access, adding a critical second layer of security[1][6].
2. Dynamic Security Codes
- Generates time-sensitive, unique codes (similar to TOTP) that must be entered alongside standard credentials[1][4]. - Codes are regenerated periodically to prevent reuse or interception[1].
3. Rigid Authentication Mechanism
- Implements strict security protocols to prevent unauthorized access, even if passwords are compromised[4][6]. - No sensitive data (e.g., financial information) is stored or collected by the app[3][6].
4. Privacy-Focused
- No data collection: The app explicitly states it does not collect user data[1][6]. - TLS encryption: Ensures secure communication between the app and Cetbix servers[3].
How It Works
1. Login Initiation: A user enters their username and password on the Cetbix login page[9]. 2. MFA Trigger: Cetbix sends a push notification or generates a security code via the authenticator app. 3. User Approval: The user approves the login request or enters the dynamic code. 4. Access Granted: Upon successful authentication, the user gains entry to the Cetbix platform[1][6].
Security Measures
1. TLS Encryption: Protects data in transit between the app and Cetbix systems[3]. 2. No Local Storage: Sensitive credentials or codes are not stored on the device[6]. 3. Compliance: Aligns with modern security standards, though specific certifications are not listed in app details[1][3].
The Cetbix Access Authenticator app provides a secure, privacy-conscious MFA solution tailored for Cetbix users, combining push notifications and dynamic codes to enhance login security.
Citations
- [1] https://play.google.com/store/apps/details?id=com.cetbix.appnotification
- [2] https://apps.apple.com/gt/app/cetbix-access-authenticator/id1621293327
- [3] https://www.cetbix.com/contents/technicalorganizationmeasures
- [4] https://apps.apple.com/tr/app/cetbix-access-authenticator/id1621293327?l=tr
- [5] https://www.cetbix.com/products/cetbixismssoftware
- [6] https://apps.apple.com/my/app/cetbix-access-authenticator/id1621293327
- [7] https://wikki.cetbix.net/index.php?title=ABOUT_CETBIX_ISMS
- [9] https://www.cetbix.com/signin.php