“The time has come to throw passwords out and replace these with a more secure and user-friendly solution.”

Bart Preneel, Professor Cryptography, KU Leuven

Seamless User Experience

Why choose n-Auth?

fingerprint

Seamless user experience

The best authentication from a user perspective is invisible authentication. This is exactly what n-Auth does. For more security, you can add a second authentication factor to your app, like a PIN code or fingerprint.

business

Full control

n-Auth has been designed to run on premise, next to the application backend, keeping you in full control of this critical part of your IT infrastructure.

transform

Easy integration

n-Auth integrates easily with the application backend to authenticate both direct connections from n-Auth enabled apps and transferred authentications from other devices.

https

Security

n-Auth brings together multiple security techniques, directly from KU Leuven – COSIC, going far beyond commodity technology.

tune

Dynamic authentication

Flexibility to match any use case.

history

Post-blockchain auditing technology

n-Auth creates an unforgeable, GDPR-compliant log to provide solid evidence for audits.

Solutions

smartphone

Custom authentication apps

We build your authentication app.

storage

Authentication server

Runs on premise to secure your application. Comes with both the custom authentication apps and the Mobile SDK.

library_books

Mobile SDK

Include n-Auth authentication in your apps.

Learn more

Get in touch