SlideShare a Scribd company logo
1 of 3
Download to read offline
Solution Brief – 2FA for Salesforce.com




Solution Brief – 2FA for Salesforce.com

   Need for Two Factor Authentication for Salesforce application

   You use Salesforce because you want to take advantage of their capabilities
   without having to install and maintain the application on-premise. However, you
   have some concerns about verifying who is accessing your company's confidential
   data that is stored outside of your IT environment. You are looking for a solution
   that will provide strong authentication to protect your company and your users
   from fraud.



Solution
ArrayShield’s innovative two factor authentication system - IDAS provides a secure access to
Salesforce.com application. By using its innovative pattern based authentication it provides
One-Time-Secret-Code for every transaction.

In IDAS, every user is shown with an array on the login screen which is populated with random
characters for every transaction. User has to choose a pattern which is a sequence of cells in
the array and should register the same with the system prior accessing. A translucent card is
provided to each user which has a similar structured array with transparent and opaque cells
and some random characters imprinted on the opaque cells. Each card is unique in terms of the
position of the opaque cells and the characters imprinted on them.

At the time of accessing Salesforce.com application, the user is shown with the randomly
populated array as a challenge. User will overlap the translucent card on the shown array and
will key in the characters present in the chosen pattern in the same order as a response. These
characters form the One-Time-Secret-Code for the user for that particular transaction. The
ArrayShield IDAS server verifies the user credentials by comparing user’s registered pattern and
the pattern values entered by the user. Access is given to the user if the user credentials are
valid.




                             ArrayShield | info@arrayshield.com                       Page 1
Solution Brief – 2FA for Salesforce.com




Integration Flow
The following diagram shows how Salesforce application can be integrated with ArrayShield
IDAS to enable its secure two factor authentication system.




        Figure: Integration flow diagram for the Salesforce Application with ArrayShield IDAS


Features
Innovative Technology

ArrayShield IDAS is a patent pending (globally) technology and has won several
awards/recognitions in various forums for its innovative concept.

Ease of Use

ArrayShield IDAS is based on user-intuitive patterns which are easy to remember than complex
passwords than can be easily compromised



                              ArrayShield | info@arrayshield.com                                Page 2
Solution Brief – 2FA for Salesforce.com




Interoperable System

ArrayShield IDAS can also be configured as add-on module with various products of leading
technology players. Support is available for SAML, LDAP, RADIUS, TACACS protocol etc.

Easily Customizable

ArrayShield IDAS can be easily customizable to the unique needs of every organization. Once
deployed, organizations can also configure the security strength and mechanism to the amount
of risk involved in the user’s role and usability requirements.

Benefits
Low Total Cost of Ownership

ArrayShield IDAS provides Strong Authentication at a fraction of cost of traditional alternatives.
Minimal Cost is incurred during purchase as well as maintenance. As there is no need of having
costly hardware tokens or transactional costs incurred because of SMS etc, ArrayShield’s
Product provides lowest Total Cost of Ownership. No costly server hardware needed.

Mobility of the user

As ArrayShield uses a simple plastic card that can be carried on the go, it doesn’t have any
dependencies. Hence user will be able to access the application any-time, any-where.

Provides peace of mind

Protects Organizations and customers from Online Identity and data theft, hence provide peace
of mind.

Provides Compliance with regulations

Regulatory agencies agree that passwords are a weak link and are requiring companies to
implement stronger authentication. ArrayShield is a rapid, cost-effective way to comply with
Industry Guidelines, Security Standards and other Industry regulations.

Conclusion
By using IDAS Two-Factor authentication solution, organizations can enable the secure access
to their Salesforce account. The solution will make organizations of all sizes and complexities
protect from the malicious attacks happening on their online accounts.




                              ArrayShield | info@arrayshield.com                        Page 3

More Related Content

What's hot

SIF IDM Profile Introduction
SIF IDM Profile IntroductionSIF IDM Profile Introduction
SIF IDM Profile Introduction
Richard Tong
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)
Luís Serra Libório
 

What's hot (20)

SaaS Platform Securing
SaaS Platform SecuringSaaS Platform Securing
SaaS Platform Securing
 
20181220 diwug setting up a secure office 365 environment
20181220   diwug setting up a secure office 365 environment20181220   diwug setting up a secure office 365 environment
20181220 diwug setting up a secure office 365 environment
 
20191010 - O365 connect setting up a secure office 365 environment
20191010 - O365 connect setting up a secure office 365 environment20191010 - O365 connect setting up a secure office 365 environment
20191010 - O365 connect setting up a secure office 365 environment
 
Cloud Identity and Access Management
Cloud Identity and Access ManagementCloud Identity and Access Management
Cloud Identity and Access Management
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting y...
SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting y...SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting y...
SPSNL17 - Secure Collaboration: Start classifying, labeling, and protecting y...
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Microsoft Cloud Identity and Access Management Poster - Atidan
Microsoft Cloud Identity and Access Management Poster - AtidanMicrosoft Cloud Identity and Access Management Poster - Atidan
Microsoft Cloud Identity and Access Management Poster - Atidan
 
SIF IDM Profile Introduction
SIF IDM Profile IntroductionSIF IDM Profile Introduction
SIF IDM Profile Introduction
 
Vmware Airwatch 8.3 Is A Quintessential Enterprise Mobility Security Solution
Vmware Airwatch 8.3 Is A Quintessential Enterprise Mobility Security SolutionVmware Airwatch 8.3 Is A Quintessential Enterprise Mobility Security Solution
Vmware Airwatch 8.3 Is A Quintessential Enterprise Mobility Security Solution
 
A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
Cloud introduction
Cloud introductionCloud introduction
Cloud introduction
 
MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)MS Cloud Identity and Access Infographic 2015 (1)
MS Cloud Identity and Access Infographic 2015 (1)
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
 
Azure multi factor authentication - Global Azure bootcamp 2018 security
Azure multi factor authentication - Global Azure bootcamp 2018  securityAzure multi factor authentication - Global Azure bootcamp 2018  security
Azure multi factor authentication - Global Azure bootcamp 2018 security
 
Azure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protectionsAzure AD - Password attacks - logging and protections
Azure AD - Password attacks - logging and protections
 
70 346 Managing office 365 identities
70 346 Managing office 365 identities70 346 Managing office 365 identities
70 346 Managing office 365 identities
 

Similar to Two Factor Authentication for Salesforce

saassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfsaassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdf
SahilSingh316535
 
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdfSASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
Anto664537
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
Hai Nguyen
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
edgar6wallace88877
 
Over view of cloud computing
Over view of cloud computingOver view of cloud computing
Over view of cloud computing
Ahsan Shuvo
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
Jose R
 

Similar to Two Factor Authentication for Salesforce (20)

What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
 
Arx brochure - Intellect Design
Arx brochure - Intellect DesignArx brochure - Intellect Design
Arx brochure - Intellect Design
 
SaaS Security.pptx
SaaS Security.pptxSaaS Security.pptx
SaaS Security.pptx
 
saassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdfsaassecurity-230424030940-08314322.pdf
saassecurity-230424030940-08314322.pdf
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 
Top SASE (Secure Access Service Edge) Vendors of 2024
Top SASE (Secure Access Service Edge) Vendors of 2024Top SASE (Secure Access Service Edge) Vendors of 2024
Top SASE (Secure Access Service Edge) Vendors of 2024
 
A Guide to Secure Acceess Service Edge.pptx
A Guide to Secure Acceess Service Edge.pptxA Guide to Secure Acceess Service Edge.pptx
A Guide to Secure Acceess Service Edge.pptx
 
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdfSASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 
Saas security
Saas securitySaas security
Saas security
 
8 major facts you must know before you buying a casb
8 major facts you must know before you buying a casb8 major facts you must know before you buying a casb
8 major facts you must know before you buying a casb
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
SaaS Software Development Best Practices_ 2024.pdf
SaaS Software Development Best Practices_ 2024.pdfSaaS Software Development Best Practices_ 2024.pdf
SaaS Software Development Best Practices_ 2024.pdf
 
SAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero TrustSAP Application Access with Instasafe Zero Trust
SAP Application Access with Instasafe Zero Trust
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
 
cloud computing unit1-2
cloud computing  unit1-2cloud computing  unit1-2
cloud computing unit1-2
 
Service Models - Databas - Monitoring - Communication.ppt
Service Models - Databas - Monitoring - Communication.pptService Models - Databas - Monitoring - Communication.ppt
Service Models - Databas - Monitoring - Communication.ppt
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
Over view of cloud computing
Over view of cloud computingOver view of cloud computing
Over view of cloud computing
 
Open am and_radiantone
Open am and_radiantoneOpen am and_radiantone
Open am and_radiantone
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Two Factor Authentication for Salesforce

  • 1. Solution Brief – 2FA for Salesforce.com Solution Brief – 2FA for Salesforce.com Need for Two Factor Authentication for Salesforce application You use Salesforce because you want to take advantage of their capabilities without having to install and maintain the application on-premise. However, you have some concerns about verifying who is accessing your company's confidential data that is stored outside of your IT environment. You are looking for a solution that will provide strong authentication to protect your company and your users from fraud. Solution ArrayShield’s innovative two factor authentication system - IDAS provides a secure access to Salesforce.com application. By using its innovative pattern based authentication it provides One-Time-Secret-Code for every transaction. In IDAS, every user is shown with an array on the login screen which is populated with random characters for every transaction. User has to choose a pattern which is a sequence of cells in the array and should register the same with the system prior accessing. A translucent card is provided to each user which has a similar structured array with transparent and opaque cells and some random characters imprinted on the opaque cells. Each card is unique in terms of the position of the opaque cells and the characters imprinted on them. At the time of accessing Salesforce.com application, the user is shown with the randomly populated array as a challenge. User will overlap the translucent card on the shown array and will key in the characters present in the chosen pattern in the same order as a response. These characters form the One-Time-Secret-Code for the user for that particular transaction. The ArrayShield IDAS server verifies the user credentials by comparing user’s registered pattern and the pattern values entered by the user. Access is given to the user if the user credentials are valid. ArrayShield | info@arrayshield.com Page 1
  • 2. Solution Brief – 2FA for Salesforce.com Integration Flow The following diagram shows how Salesforce application can be integrated with ArrayShield IDAS to enable its secure two factor authentication system. Figure: Integration flow diagram for the Salesforce Application with ArrayShield IDAS Features Innovative Technology ArrayShield IDAS is a patent pending (globally) technology and has won several awards/recognitions in various forums for its innovative concept. Ease of Use ArrayShield IDAS is based on user-intuitive patterns which are easy to remember than complex passwords than can be easily compromised ArrayShield | info@arrayshield.com Page 2
  • 3. Solution Brief – 2FA for Salesforce.com Interoperable System ArrayShield IDAS can also be configured as add-on module with various products of leading technology players. Support is available for SAML, LDAP, RADIUS, TACACS protocol etc. Easily Customizable ArrayShield IDAS can be easily customizable to the unique needs of every organization. Once deployed, organizations can also configure the security strength and mechanism to the amount of risk involved in the user’s role and usability requirements. Benefits Low Total Cost of Ownership ArrayShield IDAS provides Strong Authentication at a fraction of cost of traditional alternatives. Minimal Cost is incurred during purchase as well as maintenance. As there is no need of having costly hardware tokens or transactional costs incurred because of SMS etc, ArrayShield’s Product provides lowest Total Cost of Ownership. No costly server hardware needed. Mobility of the user As ArrayShield uses a simple plastic card that can be carried on the go, it doesn’t have any dependencies. Hence user will be able to access the application any-time, any-where. Provides peace of mind Protects Organizations and customers from Online Identity and data theft, hence provide peace of mind. Provides Compliance with regulations Regulatory agencies agree that passwords are a weak link and are requiring companies to implement stronger authentication. ArrayShield is a rapid, cost-effective way to comply with Industry Guidelines, Security Standards and other Industry regulations. Conclusion By using IDAS Two-Factor authentication solution, organizations can enable the secure access to their Salesforce account. The solution will make organizations of all sizes and complexities protect from the malicious attacks happening on their online accounts. ArrayShield | info@arrayshield.com Page 3