Contact salesSign inSign up

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Join us today!

No-Code Rules Engine

Create rules and policies with no engineers.

Optimize your customer experience and manage risk with fine-grained control of your customer journeys with our powerful no-code rules engine.

No-code Rules Engine: Fine-Grain Control for Risk & CX - Authsignal
No engineers required.

Build and maintain complex rules without distracting your teams. Our visual rules editor empowers you to write, test, and monitor the effectiveness of your rules in real time.

Fraud centric.

Authsignal's rules engine has been designed specifically around fraud use cases and requirements. Our transaction velocity, time-based windowed aggregations, and pre-built rules library allow you to customize what works best for your application.

Inject custom data.

Take your step up authentication logic to the next level. Inject custom data signals like risk scores into your segmented rules to gain even more control over the process.

No-code Rules Engine: Fine-Grain Control for Risk & CX - Authsignal
SMS One Time Password (OTP)

Simply connect your Twilio or Messagebird account to turn on SMS One Time Password (OTP).

Authenticator apps (TOTP)

Ensure a smooth user experience with Time-Based One Time Password (TOTP) authentication.

Biometrics (WebAuthn/FIDO2)

Use modern web and mobile browsers with built-in biometrics and specialized hardware devices like YubiKeys.

Push Notifications

Drop Authsignal's SDKs into your mobile application for instant push notification authentication.

Build powerful rules with our ready-to-use data points.

Inject custom data

IP Geo/Country code
Geo-IP match.
IP Anonymous origination
Matches the IP address against a list of known anonymous exit codes, VPN, Tor, Proxies.
Atypical travel
The IP address corresponds to a location which is outside the normal range of the user's previously verified location.
Impossible travel
The IP address corresponds to a location which is outside the normal range of the user's previously verified location, and the distance between the locations could not feasibly have been traveled within the time range by any commercial flight.
IP country code is in OFAC list
The IP address belongs to a country code which is included in the OFAC list published by the US government.
IPv4 Address
String match on IPv4 address.
IPv4 CIDR Range
Match on CIDR range.

Device

Device is a bot
Detects if the device user-agent string is a known bot.
Device is new
Never before seen device that has not been previously authenticated.
Device count
The number of devices attributed to the user.
Device last authenticated at
The timestamp of which a device was last previously authenticated, creates rules to enforce challenges for previously authenticated devices based on a time period, i.e. 1 hour ago, 1 day ago etc.
Device user count
The number of users that have been associated with the device.
Is Jailbroken
Indicates if there’s a signal that the device is using a jailbroken OS.
Is using an emulator
Indicates if there’s a signal that the device is using an emulator.

User Agent

Operating System
The operating system of the device.
Browser Engine
Browser engine being used (e.g. Webkit etc).
Browser
Browser being used (Chrome, Safari).

Crypto

Wallet address
Wallet address (string match).
Asset code
Crypto asset code (e.g. ETH, BTC).
Asset amount
The amount for the given transaction in asset denomination.
Asset amount (USD)
The amount for the given transaction in US dollars.

User

User ID
The ID of the user associated with the tracked action.
Email Address
The email of the user associated with the tracked action.
Enrolled authenticators
Number of authenticators enrolled.
Type of enrolled authenticators
Type of Authsignal authenticators enrolled (e.g. SMS, TOTP, PASSKEY).
Has previously been verified
Has the user completed at least 1 successful challenge.

Cross Action context

Dynamically reference other tracked actions via window aggregations
Reference another action based on the count of occurrences (e.g. email changed in the last 1 hour).

Custom metadata

Transaction metadata
Any available metadata at the point of transaction / action of types:
• String
• Number
• Boolean
(e.g. transaction information amount, internal risk scoring).
User metadata
User level persistent metadata of types:
• String
• Number
• Boolean
(e.g. CRM related data, customer group, customer attributes).
Effortless UX

Simply drop in our top-tier Authenticator Enrolment and Challenge flows. Add your logo and away you go.

SDK support

Launch enrolment and challenge flows from our Web Authsignal.js client SDK, or through Native Mobile Web views.

Easy integrations

Drop Authsignal's flows into your favorite CIAM (i.e. Auth0, Cognito) with our easy-to-use APIs and SDKs.

Features

Secure your customers’
accounts today with Authsignal

Resources

How to Build a Secure Authentication Chain: Avoid Passkey Pitfalls and Enhance User Experience.
Learn how to build a secure authentication chain and avoid common passkey pitfalls. Discover key strategies to enhance security and user experience with passkeys and protect every stage of the authentication process.
Adaptive MFA for Auth0: Customize MFA UX to reduce consumer friction without upgrading your plan.
In this blog post, we will dive deeper into how you can fine-tune the MFA user experience with only some minor tweaks to your integration code.
Best Practices for Call Center Authentication & Fraud Prevention - Authsignal
Learn call center authentication best practices, including passive methods like FIDO2 passkeys and biometrics, to enhance security and prevent fraud.
View all articles