Welcome to Access Authenticator

Access Authenticator allows administrators to ensure only authorized users are granted access to their IBM i systems by requiring two pieces of evidence in order to validate each user's identity, a method of access control known as multi-factor authentication. Access Authenticator allows network users to easily register a mobile device or YubiKey to act as the second authentication factor, in addition to their IBM i or Active Directory credentials.

Access Authenticator is designed to challenge users as they access the IBM i. It can be used to sign on to interactive sessions or when FTP is used to connect to the system.

See User Setup Procedure for details on setting up Access Authenticator for authentication.

See User Authentication for details on how to authenticate using Access Authenticator as an end user.

 

 

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
1.3 | 201807251235 | July, 2018