Applications of Zero Trust Identity in Consumer Authentication

  • Strong Multi-factor authentication. This is a type of authentication that requires users to provide two or more pieces of evidence to prove their identity, that is phishing resistant like Passkeys and FIDO2 security keys.
  • Risk-based authentication. This is a type of authentication that takes into account the risk level of a particular transaction when determining the level of authentication required.
  • Behavioral analytics. This is a type of authentication that analyzes user behavior to identify suspicious activity

Practical zero trust policies to implement in the context of consumer applications

  • Challenge with MFA as a default - Assume sessions have been hijacked or symmetric credentials breached, and apply a step up challenge flow as a default
  • New Device Risk - New devices are always a strong risk signal, track device ID's or fingerprints, and timestamp last MFA attempt
  • Device last authenticated timestamps - With friendly fraud on the rise, and poor consumer controls on devices (like lock screens, shared family devices) assume that the long lived sessions are prone to risk, create windows where there is high assurance that the user was who they said they were since the last successful authentication attempt and only forgo step up authenticaion if comfortable
  • High risk transactions - Regardless of legitamacy high risk transactions like high withdrawal amounts, and high velocity of transactions within a short window, transfers to new bank account numbers always pose an element of risk. The ability to offer a step up offers an important buffer between the customer and the final authorization, and adds a layer of transaction signing that can be verified
  • Behavior - Typically certain behaviors precede a high risk action, like changing a password, changing an address, followed by iniating a high value transaction. Being able to bring events in from disparate systems to build policies that have behavioral context allows effective targeting of specific bad actor behavior
  • OpenID/OAuth2.0 Claims - Use context from a Open ID auth flow when an application/relying party is requesting acess, together wuth the scopes that it's requesting are a place to overlay zero trust policies i.e. you may have an application or third party app that is contains a higher risk profile or requesting for claims that are more priveleged
  • Restrict authentication to high assurance factors - If the customer has opted in to higher assurance factors like Passkeys, Secuity Keys (Yubikey), Time based one-time passwords (TOTP) restrict the ability to use weaker factors
Authsignal's No Code Rules Engine allows for zero trust policies to be implemented in real time
Authsignal's No Code Rules Engine allows for zero trust policies to be implemented in real time

Authsignal's Drop in Passwordless Authentication orchestration suite

The great news is that implementing zero trust security principles into your consumer applications is very simple with Authsignal. Regardless if you're using an identity provider like Auth0/Azure AD B2C (Entra) or have your own identity stack, Authsignal's drop in solution allows your team to deploy these zero trust customer journeys very quickly, with our OpenID Connect integrations or our single API call you can explicitly verify your customer at crucial touch points.

Sign up for a free account and try out how easy it is to protect your customer accounts.