Strong Authentication
Strong authentication ensures only authorized end-users access sensitive data, servers, and other enterprise assets.
With E-semnatura, customers can enforce granular security controls on a wide range of resources without needing to reconfigure servers or modify applications manually.
Use Key-Based Authentication
Username and password-based authentication are relatively easy to break via social engineering, password stuffing, or simple brute force attacks. Use protocols such as secure shell (SSH) and mutual transport layer security (TLS) to assign end-users unique digital identities and require key-based authentication whenever possible.
Centrally Secure All Private Keys
The enterprise must manage many keys and certificates when using key-based authentication via mutual transport layer security (TLS) or secure shell (SSH). To simplify management and strengthen cybersecurity, all private keys should be stored in a centralized hardware security module (HSM) or key manager.
Authenticate Clients Prior To Key Usage
When a client needs to use a particular key, they send the request to E-semnatura. E-semnatura authenticates the client before interfacing with the hardware security module (HSM) to perform the private key operation. As a result, the private keys always remain secured and granular security controls are easily enforced.
Enforce Granular Access Controls
E-semnatura supports a number of granular controls, including multi-factor authentication (MFA), device authentication, approval workflows, and more. Because clients authenticate to E-semnatura when they need to use a key, these granular controls can be enforced on a per-key or per-user basis with a few clicks from the E-semnatura interface. There’s no need to reconfigure servers or applications.