Affirmed Identity™ - Zero Trust Passwordless Push Authentication

Zero Trust. Zero Passwords. Zero Compromise.




AffirmedID

AffirmedID isn’t a rehash of outdated ideas — it’s a bold, modern rethink of authentication from the ground up.




Born from a 2014 breakthrough, AffirmedID is a next-gen authentication platform delivering near-total phishing resistance, compliant MFA, CMMC 2.0 foundational support at all levels, and a seamless passwordless, credentialless experience. Backed by multiple patents, it blends proven technologies with original innovation where needed.


MSP clients are better protected and more empowered when upgraded to the enhanced security of AffirmedID.


Leveraged Credentials

.



Real MFA

Multi-factor authentication (MFA) is a necessary defense in every organization’s cybersecurity strategy. By requiring multiple factors to be verified before granting access, MFA protects your applications and data. It helps to ensure that only authorized users can log into company networks.




Real Multi-Factor Authentication (Real MFA) complies with NIST SP 800-63B for every authentication ceremony without compromising the User Experience (UX). AffirmedID push authenticator produces two distinct factors that are independently verifiable by the authentication system and asserted with FIDO2 assurance.

Details

Continuous Authentication
A cornerstone of ZTA

MFA bypass via session hijacking is one of the top three cyberattack vectors. The most effective defense is session monitoring, which begins with continuous authentication. Session security is imperative.



The rapid rise of session hijacking has experts recommending continuous monitoring of authenticated sessions as the most effective defense. Its use can prevent or substantially reduce the impact of a hijacked session. AffirmedID’s continuous authentication originating from a device in the user’s possession substantially improves protection from the threat of session hijacking.

Details

Authentication as a Service

AaaS must establish, protect, and affirm the user’s identity not as a singular event but as a continuum from login to log out.




A robust AaaS must establish, protect, and continuously affirm the user's identity, not just once but throughout, from login to logout. It involves continuously evaluating the risks associated with authenticated sessions and enforcing appropriate security policies, thereby establishing and maintaining trust in ongoing user identity and authorizations.

Defined

Gaps in the Authentication Process

Gaps in the authentication process, whether by design, misconfiguration, misuse, mistakes or human error, become attack vectors bad actors take advantage of. Even the most secure MFA solution will fail to secure the session if gaps elsewhere in the process are allowed.



Reducing the gaps in authentication processes is crucial to improving security. Doing so significantly reduces the risk of session hijacking. A gap naturally exists between each step in the authentication process. Off-device redirects are high risk-sensitive gaps. The user interacting with an authenticator is the first potential gap in the process. Others follow and each is a point where session hijacking can occur. In February 2025 the $1.5B cryptocurrency heist took advantage of a gap.

Defined

Authentication, a Seamless Experience

Each link in the chain of the authentication journey must seamlessly link to the next from identity verification to session monitoring and logout.




In essence, the AaaS authentication journey should feel and operate like a fluid and integrated process, where each step builds upon the previous one to establish, maintain, and affirm the user's identity and session security. This seamless approach is a hallmark of AffirmedID Authentication as a Service.

Defined

The User Experience

A difficult, problem prone, complex user experience is counterproductive and where authentication and access controls are concerned it may become a security risk too.



Organizations face significant challenges when it comes to authentication and user experience. Nearly two-thirds of surveyed companies (64%) cite challenges with user experience as a major pain point in their authentication processes. UX problems not only cause user frustration and dissatisfaction, but also obstruct work, increase costs, and may compromise security if users seek shortcuts to features meant to protect users, systems, and data.

Defined

Deployment

words


words


Support, Maintenancee, and Updates

words


words


Compliance Table

A Factor is a claim that a relying party can verify.

Authenticator Distinct Authentication Factors Continuous Authentication Monitoring MFA PCI DSS ZTA
FIDO2 1/21 No No AAL2 No
Passkey 1/21 No No AAL2 No
Passwordless Push 2 No No AAL2 No
WorldApp 1 No No AAL1 No
AffirmedID 2 Yes Yes2 AAL3 Yes
Authentication Factors: Something you are, something you know, and something you have.
Continuous Authentication Factors: Your location, your proximity to devices, and your behaviors.
Thoroughly vet claims of MFA support. Often they assume the use of additional third party factors.
1. Caution, the second factor is conditional and when provided must be independently verifiable, even in the case where the Verified (UV) flag is used. Refer to MFA above.
2. AffirmedID requires two (2) forms of user identity proofs, refer to MFA above.




Seamlessly Bridging AffirmedID to the IAM Landscape

An ongoing integration project adding ZT compliant Identity Service to every IAM

Availability: Now

Protocols: SAML, OIDC, OAuth 2

An error has occurred. This application may no longer respond until reloaded. Reload 🗙