704-333-0404

AuthPoint Inherited Users

As a Service Provider, you might manage dozens of customer accounts and need access to your customers’ systems and environments, such as a VPN or a server. With the user inheritance feature, you can request that customer accounts inherit an AuthPoint user from...

AuthPoint Inherited Users Beta

As a Service Provider, you might manage dozens of customer accounts and need access to your customer’s systems and environments, such as a VPN or a server. With the user inheritance feature, you can request that customer accounts inherit an AuthPoint user from your...

New AuthPoint Time Schedule Policy

Earlier this year, we launched the AuthPoint Risk Framework, a powerful and flexible way to manage authentication policies. We are now happy to announce that we have launched the Time Schedule as a new type of policy. The Time Schedule...

New AuthPoint Time Schedule Policy Beta

Earlier this year, we launched the AuthPoint Risk Framework, a powerful and flexible way to manage authentication policies. The latest AuthPoint beta focuses on time-based policy objects, which enable you to specify the dates and times when...