Passwordless authentication as a Service

Connecting to a service should always be secure and simple.

GET STARTED

User experience and data security are at the heart of the profitability of your services because of their costs of support, prevention and even correction.

Connecting to a service should always be secure

RemAuth eliminates the main vulnerability of your connected services

Passwords are responsible for 63% of proven violations of data.

This is one of the key learnings of recent Verizon report about confirmed data breaches which are caused by weak, default or stolen passwords.

Thanks to its passwordless technology, RemAuth is able to eliminate the main vulnerability of connected Internet services.

Thus, the security of access to your services is no longer dependent on the good or bad use of passwords by your users.

RemAuth eliminates the main vulnerability of your connected services
RemAuth makes biometric verification available to all your services

RemAuth makes biometric verification available to all your services

Biometrics is becoming an essential technology for cybersecurity and is a strong expectation from users.

This is one of the main actions to take as recommended by the French security organizations ANSSI and CESIN to improve the security of services.

It also meets the high demand from users as revealed in a research of Mastercard and University of Oxford which shows that 93% of UK consumers prefer biometrics to passwords.

It is the reason why the RemAuth Control application supports biometric checking on a wide range of Android and iOS smartphones.

You just have to set the biometric option in the Customer Center services properties according to your requirements.

RemAuth enables very high security
thanks to RemAuth cards

Optional 2nd physical factors that are customizable and easy to implement.

RemAuth Cards are physical authentication factors defined by unique, configurable and even repudiable visual codes.

RemAuth Cards can be customized for any service provider for distribution to their users. Users just have to scan them on demand using the RemAuth Control application.

 2<sup>nd</sup> physical factors that are customizable and easy to implement

Connecting to a service should always be simple

Passwordless
Authentication

Users

  • No effort to remember or to manage passwords.
  • No risk of loss or identity theft.

Service providers

  • Less user loss on subscription and login.
  • Less user support.

Biometric
remote control

Users

  • A de facto standard on smartphones.
  • No additional effort for biometric checking.

Service providers

  • Biometric option is easy to enable and to disable.
  • Biometric checking is tracked in logs.

RemAuth
Cards

Users

  • They work with any smartphone.
  • Simple QR-codes to scan.

Service providers

  • Easy to deploy.
  • Low-Tech / Low-Cost.

An API should always be simple and secure

The RemAuth service is based on a simple and secure HTTP API which ensures its integration with any existing system. With its additional Open Source libraries, the RemAuth API enables a smooth migration from password-based legacy systems to password-free services.

API simple

  • Standard HTTP API.
  • POST and GET methods.
  • JSON response type.
  • Online doc with integrated endpoint testing.

API sécurisée

  • TLS 1.2 secure server.
  • OAuth2-like security token.
  • Only unique and ephemeral codes.
  • No storage of sensitive data.
Example of cURL request to the RemAuth API authentication endpoint
Example of cURL request to the RemAuth API authentication endpoint

Many thanks to subscribers who trust us with their numerous API requests.
RemAuth is committed to provide them a high quality service

Self-service

You can get started in a few minutes by creating an account for free in the Customer Center.

You will be able to configure and integrate RemAuth for as many services as you wish, with the help of the online documentation.

Depending on your needs, you can then switch to a paid service level by selecting a subscription plan.

Support

We can help you to implement RemAuth by providing training, consultancy or implementation support, either on-site or remotely.

White label

  

The RemAuth Control application can be customized with your brand and colors, and then delivered on the appropriate application stores.

Your customized application will benefit from the same updates as the original app.

Do not hesitate for any request.

Partners & Labels

Powewered by Stripe payment service
Trustech SESAMES AWARDSLa French TechCluster Digital League

—— Latest blog post ——