Included:
Passwordless authenticator | |||
Frictionless MFA - no passwords, one-time codes, or second device | It’s a new, frictionless authenticator with no passwords, one-time codes, or second device required. | Y | Y |
Download on PC, Mac, Android, iPhone, iPad | The Beyond Identity Authenticator is compatible with PC, Mac, Android, iPhone, and iPad devices. It can be downloaded on multiple devices to provide a consistent, omnichannel login experience, reduce lockouts, and users don't have to pick up a second device to log in. | Y | Y |
Supports login to web browser and native single sign-on-enabled apps | Users can log in to web browser-based apps and native apps on all of their devices using their credentials in the Beyond Identity Authenticator. | Y | Y |
Supports local and domain-joined desktop logins | Users can use the authenticator to log in to their domain-joined desktop. | Y | |
End-User Self-Sign-Up and Recovery | |||
Manage My Devices | Add, Suspend, Remove your devices | Y | Y |
View My Authentication History | View history of authentications, and added and removed devices | Y | Y |
Admin Controls | |||
Directory | Utilize our built-in directory, or sync your directory with Beyond Identity to provision users | Y | Y |
Automated Provisioning | Provision users en masse with SCIM, API, Event hooks | Y | Y |
Passwordless SSO Login | Passwordless login to single sign-on-enabled applications | Y | Y |
SSO Integration | No-code integrations with the most common single sign-ons (Okta, Ping Identity, ForgeRock, Microsoft ADFS) | Y | Y |
30-Day Summary and Event Data | 30-day summary dashboard and 30 days of event logs available for viewing | Y | Y |
All Event Logs and Audit Trail | Immutable audit trail and export event log | Y | |
Passwordless Desktop Login | Passwordless login to domain-joined desktops | Y | |
Active Directory Integration for Desktop Login | Out-of-the-box integration with Microsoft AD, no certificate management required | Y | |
User and Device Lifecycle Management | View and manage all users and devices | Y | Y |
Enrollment Management | Track number of users enrolled, remind users to enroll, push different enrollment methods | Y | |
SIEM and GRC Integration | Push event logs to your SIEM and GRC solutions | Y | |
Continuous Risk-Based Access | |||
Risk-Based Policies | Configurable, selectable policies based on granular contextual signals | Y | |
Step-Up Verification | Ask the endpoint for the local identifier that the user initially used to log in | Y | |
Device Context | Risk-based access decisions based on 12+ device security posture and device’s IP address, on managed and unmanaged devices | Y | |
UEM, MDM, EDR Presence Check | Check if the device has a unified endpoint management, mobile device management, or endpoint detection and response software actively running on it | Y | |
Support | |||
Standard Business Hour Support | Portal and email support 8 am - 5 pm CT, M-F, excluding holidays | Y | Y |
Additional Services
Advanced
onboarding
$2,500
Required for advanced initial setup
Professional
Services
$2,500
per day, must be used within 6 mths
Premium support for free tier
$3
per user / month
24/7, 365
Premium support for advanced
18%
annual contract value
24/7, 365