IdentityX
Documentation Home
  • Getting Started
  • About IdentityX
  • Quick Start
    • New user
    • Invited user
    • Frequently asked questions
    • Glossary & terms
  • Navigating the interface
    • Logging in to IdentityX
    • Selecting an organization
    • Selecting an application
    • Searching & sorting
  • Organizations
    • Creating an organization
    • Listing & inviting users
    • Modifying or removing users
  • Applications
    • Creating an application
  • Access Levels
    • Creating an access level
    • Modifying an access level
  • Teams
    • Viewing & finding teams
    • Creating a team
    • Modifying a team
    • Authentication methods
  • Users
    • Viewing & finding users
    • Creating a user
    • Modifying a user
Powered by GitBook
On this page

About IdentityX

IdentityX Platform Philosophy

IdentityX's login process is markedly different from many, notably the absence of a password. As a platform, IdentityX provides a more simple & secure login process by:

  • Not storing passwords

    • Passwords are not used or stored within IdentityX, meaning that a compromised password used elsewhere cannot be guessed by a third party

    • Users don't need to remember yet another password, or (more commonly) reuse an existing password that could have been compromised elsewhere.

    • Having no stored passwords (encrypted or otherwise) means IdentityX cannot be a breach source of password data.

  • Enforcing two-factor authentication

    • Having a two-step authentication flow increases security by ensuring that the user is who they purport to be, verified by access to the user's email account.

    • Having a second factor of authentication increases security markedly across the board.

  • Providing the option of IP Address whitelisting to allow access control without an email.

PreviousGetting StartedNextNew user

Last updated 4 years ago