Background

Two Factor Authentication

With more and more businesses adopting cloud services and remote working, The Bunker’s portfolio of Two Factor Authentication (2FA) services allows businesses to balance the increasing need for cybersecurity with the business case for accessibility.

Our service allows you to implement 2FA into any of your applications or remote access systems; whether remote roaming VPN users, business management systems or your intranet site, our 2FA allows you to enhance and control your users’ access to these applications.


Is it right for me?

Increasingly, traditional password-based authentication is being relied upon less and less, with many compliance standards, including PCI DSS, demanding multiple factor authentication.

Password based authentication is susceptible to dictionary-based attacks, social engineering or compromise via re-used passwords. Despite your best efforts to enforce robust password policies, usernames and passwords are simply no longer enough to keep the attackers out.

The weakest link in your application is not your site security rating and good development practices, it’s your user-base. Mitigate this risk by using our 2FA services and start to mitigate the risk to your confidential business information.

Protect your user VPNs and application authentication with one of our secure two factor authentication services.

Why choose The Bunker?

The Bunker’s 2FA products offer a range of identity management services, whether fully managed or delegated to your existing popular directory services systems, we can tailor one of our products to fulfil your specific requirements.

Our team is an extension of yours; utilise our decades’ worth of experience in cyber security to cease your reliance on traditional based username and password authentication and tighten your system security.

How Two Factor Authentication works

Here at The Bunker, our approach is always collaborative. Our VPN 2FA service provides your users with 3 things: software or hardware authentication tokens, a digital certificate and a private key. The user has a unique password and pin (which only they know) which are entered when connecting to the VPN; the password unlocks the private key and starts the software, while the pin generates a One-Time Password (OTP) to send authentication to the managed identity provider through an IPSec encrypted RADIUS connection. The software/hardware token is synchronised using the Time-based, One-Time Password (TOTP) algorithm. Upon successful verification the user is allowed access to the VPN and your private systems.

Our Opensource identity and access management software provides you with Single Sign On (SSO) to all of your applications and services. Users are redirected to The Bunker’s Identity Provider (IdP) system and login using a username and password. They will then be required to enter an OTP via an authentication application which would have been already configured with the TOTP algorithm. The user is issued a cryptographically signed authentication token, the application performs verification of the token and the user is granted access.

Our Accreditations

  • ISO 27001
  • First
  • G-Cloud Accredited
  • ITIL Service Management
  • Microsoft Gold Partner
  • NHS IGSoC Approved
  • PCI DSS
  • PRINCE2
  • RIPE NCC Member
  • Tech UK
  • Veeam Gold Cloud & Service Provider Partner
  • PCI Participating organization
  • Dell EMC Gold Partner
  • Cyber Essentials Plus
  • AWS Select Consulting Partner