Two Factor Authentication on IBM i

Alliance Two Factor Authentication

Two Factor Authentication on IBM i
800.357.1019
800.357.1019

Alliance Two Factor Authentication brings mobile and voice two factor authentication to the IBM i platform. IBM i customers can significantly improve the security of their IBM i systems through implementation of proven two factor authentication.

Improved Security with Two Factor Authentication
Two Factor Authentication (2FA), sometimes known as Multi-Factor Authentication, is helping organizations to improve the security of their core business applications. Two Factor Authentication helps reduce the security threat by requiring an additional authentication mechanism beyond just a memorized password.
 
Alliance Two Factor Authentication provides the IBM i security administrator an easy-to-use method of implementing a Two Factor Authentication mechanism based on Twilio's Authy, voice, or mobile SMS text technologies.
 
Passwords are Weak
Many passwords use familiar details that can either be guessed or easily found out. The use of Two Factor Authentication ensures only authorized individuals obtain access to your systems and sensitive data by requiring something you know (your password) and something you have (your mobile phone).
 
Lower Risk
Two Factor Authentication reduces the potential for someone to guess or find out another user's password, lowering the risk for an-authorized access.  Additionally, Alliance Two Factor Authentication helps protect against system compromise from malware that uses keyboard logging to capture passwords.
 
Reduce Data Theft
Unauthorized access to information can lead to theft of valuable data which can damage your brand and result in lost business and customers taking legal action to redress their personal loss.
 
Meet Compliance Regulations
Two Factor Authentication addresses compliance requirement/recommendation issues (e.g. PCI, HIPAA, etc.) and audit requirements.
 
Alliance Two Factor Authentication supports the following features:

  • Mobile phone authentication code delivery via Twilio's Authy
  • Voice authentication code delivery to any phone
  • Up to five mobile and voice phone numbers per user
  • One-time codes (OTC) for use when phone services are not available
  • User logon authentication
  • Application Program Interfaces (APIs) for developers
  • Full authentication logging to security audit journal QAUDJRN
  • Automatic signoff on authentication failure
  • Optional user profile disable on authentication failure

 
Flexible Licensing Options
With flexible licensing options, including perpetual and subscription licensing, protecting sensitive data on the IBM i has never been easier or more affordable.
 
Alliance Two Factor Authentication provides easy to use APIs to let you extend two factor authentication into any IBM i RPG, COBOL, or CL application. Sample code helps you get up and running quickly.

Specs General

Supported Hardware and Software

Alliance Two Factor Authentication is the first and only two factor authentication solution for the IBM i that does not requre an additional appliance. Alliance Two Factor Authentication runs on any version of IBM i/OS from V5R4 through V7R1. All hardware platforms that support these versions of the operating system are also supported.

 

Licensing
The Alliance Two Factor Authentication solution is licensed on a logical partition basis. Both perpetual and subscription licenses are available.

Townsend Security has partnered with Twilio and TeleSign to deliver the Alliance Two Factor Authentication solution. A separate license agreement with either Twilio or TeleSign is required.

Solution Briefs

Alliance Two Factor Authentication

Reduce the security weakness of relying on passwords or passphrases as the primary and only authentication mechanism.

Datasheets

Alliance Two Factor Authentication

Reduce the security weakness of relying on passwords or passphrases as the primary and only authentication mechanism.

White Papers

Two Factor Authentication on IBM i

Download this white paper to learn: Why the IBM i may not be as secure as you think, the need for verification on the IBM i, and how to meet compliance requirements (PCI DSS, FFIEC, etc.)