Skip to main content
purple hex pattern
people on mobile devices

Power of choice for IT and users

With Entrust, IT professionals can support a breadth of identity credentials and provide credentials that are tailored to user requirements and preferences. Make users happy by issuing credentials that utilize their mobile device, including mobile push authentications, one-time passwords (OTPs) or smart credentials secured by PKI. We also provide grid card and SMS/email OTPs for maximum cost efficiency.

How our self-service model works

Step One

Upon setup, our self-service solution automatically sends users enrollment notifications.

Step Two

Users download our mobile smart credential app from a public or private app store.

Step Three

Users activate their digital identities by scanning QR codes, using email activation links, manually enrolling with activation codes or leveraging an existing identity, such as a Derived-PIV smart card or an EMV bank card, to bootstrap the credential issuance process.

Step Four

Almost instantly, users can access websites, VPNs, apps and other services, such as digital signing and encrypted email. No passwords, usernames, smart cards or hardware tokens are required.

Identity Portfolio

IAM

Identity as a Service


Cloud-based IAM solution with multi-factor authentication (MFA), passwordless access, and SSO.
IAM

Identity Enterprise


Identity Enterprise multi-factor authentication establishes and maintains trusted identity for all users, providing strong digital security for your enterprise.
IAM

Identity Essentials


Use Identity Essentials to keep your systems and data safe with multi-factor authentication and more.

Our identity portfolio capabilities:

Authenticate

Streamline the onboarding of diverse users and devices with a wide range of technologies.

Authorize

Ensure both strong security and exceptional user experiences with these best-in-class technologies.

Transact and Manage

Continuously protect against advanced threats with technology from behavior analytics to fraud detection.

The identity portfolio suited to your authentication needs

Learn more about Identity and Access Management (IAM)