Welcome to Access Authenticator

Access Authenticator allows administrators to ensure only authorized users are granted access to their IBM i systems by requiring two pieces of evidence in order to validate each user's identity, a method of access control known as multi-factor authentication. Access Authenticator allows network users to easily register a mobile device or YubiKey to act as the second authentication factor, in addition to their IBM i or Active Directory credentials.

Access Authenticator is designed to challenge users as they access the IBM i. It can be used to sign on to interactive sessions or when FTP is used to connect to the system.

The installation components required to administer the authentication process include:

  • Version 1.15 or higher of Insite Server. HelpSystems Insite is the web browser interface used to manage Access Authenticator.
  • The Authentication Manager Server. The Authentication Manager is Access Authenticator's central processing component.
  • The Data Services Server. The Data Services includes Access Authenticator's database and backup, recovery, and HA services.

These components can be installed together on one server, or divided on two or more servers. For example, in one possible configuration, the Insite server can be installed where users can connect, and the Authentication Manager Server and Data Services can be installed together on a different server. (These systems can be Windows servers, or Linux or Unix systems.)

See Administrator Setup Procedure for details on configuring and administrating Access Authenticator.

The installation components for user authentication include:

  • The Android app. This app, available from Google Play, can be used to authenticate using Android.
  • The iOS app. This app, available from Apple, can be used to authenticate using an iPhone.
  • The Desktop Agent. This desktop application can be used to authenticate connections made through methods outside of traditional log on screens (like FTP).

The administration and configuration of Access Authenticator is done from a connection with the Insite server. Network users can register their devices using a URL provided via an email they receive after enrolling with Access Authenticator.

See User Setup Procedure for details on setting up Access Authenticator for authentication.

See User Authentication for details on how to authenticate using Access Authenticator as an end user.

View as PDF

 

 

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
1.3 | 201805100343 | May, 2018