“The time has come to throw passwords out and replace these with a more secure and user-friendly solution.”
Bart Preneel, Professor Cryptography, KU Leuven
Seamless User Experience
Start the login in the app.
Confirm your login in the app, use your fingerprint if required.
You are now logged in.
Why choose n-Auth?
Seamless user experience
The best authentication from a user perspective is invisible authentication. This is exactly what n-Auth does. For more security, you can add a second authentication factor to your app, like a PIN code or fingerprint.
n-Auth has been designed to run on premise, next to the application backend, keeping you in full control of this critical part of your IT infrastructure.
n-Auth integrates easily with the application backend to authenticate both direct connections from n-Auth enabled apps and transferred authentications from other devices.
n-Auth brings together multiple security techniques, directly from KU Leuven – COSIC, going far beyond commodity technology.
Flexibility to match any use case.
Post-blockchain auditing technology
n-Auth creates an unforgeable, GDPR-compliant log to provide solid evidence for audits.
Custom authentication apps
We build your authentication app.
Runs on premise to secure your application. Comes with both the custom authentication apps and the Mobile SDK.
Include n-Auth authentication in your apps.