Artboard 1myriad__tick

Secure IT System Access

Myriad Connect’s market-leading authentication service provides an entirely out-of-band channel for authentication, with all interactions transmitted over the mobile network, which is separate to the browser or online channel being used by the user to initiate the login.

Secure IT System Access

How the mobile secure access service works

A corporation wishes to further secure access to an online customer portal (on top of the usual username and password) while retaining a frictionless user experience, using a second channel (out of band authentication).

user attempts to add a new payee to a bank account
A user attempts to log into their account on an online portal.
Secure Access to System or Platform
The systems administrator wishes to secure access beyond just username and password and provide two factor authenticaton (2FA), but with a better UX than OTP via SMS.
Multi-factor_authentication_icon_white
To do so, a universal push notification is sent to the user’s mobile device asking them to confirm that they are attempting to login.
user attempts to add a new payee to a bank account
If the user responds favourably to the notification, the login is confirmed.

Myriad Connect’s market-leading authentication service delivers an isolated, third party authentication channel on any mobile device to establish the device as a trusted source. Using Unstructured Supplementary Service Data (USSD) provides an entirely out-of-band channel for authentication, with all interactions transmitted over the mobile network, which is separate to the browser or online channel being used by the user to initiate the login.

Myriad Connect’s session-based service sends an advanced push notification to open up a conversation between an IT system and the user to deliver a real-time check to verify the identity of the user, which cannot be tampered with via compromised third parties. Using USSD authentication, no persistent data is held with any third party, providing a more secure service than current two factor authentication services. A clear audit trail is also established, where the user’s identity is verified by a party external to the transaction.

This results in a technology that will greatly enhance the security of login processes for all users, both employees and end customers.