Are you concerned about unauthorized access to your JD Edwards system? System credentials can be acquired through cyber-attacks and other malicious activity including phishing campaigns, malware-trojans, keyloggers, remote administration tools (RAT), brute force attacks, paper notes, and other methods. According to industry experts, up to 95% of data breaches are perpetrated by hackers that have first stolen users’ credentials and then used those credentials to commit fraudulent activities.
GSI’s gShield Authentication protects your organization’s mission critical information in JD Edwards, providing an additional layer of credentialed security when a user is logging in to the system. GShield Authentication uses two factor authentication (2FA) technology, also known as multi-factor authentication, to provide a second level of validation beyond your JD Edwards username and password credentials.
This second level of authentication is quickly validated by sending a code to the user’s email or mobile phone, or by generating a QR Code using Google Authenticator or Authy.
The resulting code is entered on an authentication page before the user is granted access to JD Edwards.
- Improved Credentials Security
- Stronger Data Security
- Protection for Mission Critical Data
- Minimally Invasive – One Time User Event
- Only Product Compatible with JD Edwards
- Two-factor Authentication (2FA)
- 1st Component: Username and Password
- 2nd Component: Email Address or Mobile Number
- 6 Digit Authentication Code/QR Code
- One-time Event per Device
Two Factor Authentication
Two-factor authentication (2FA) was created to prevent unauthorized access to your systems caused by cyber-attacks and other malicious activity. 2FA uses an authentication system to double check your identity when logging into an application or website by utilizing a combination of two separate components of authentication. These components generally fall into three categories: 1) something you know, 2) something you have in your possession, 3) something specific to you (e.g. fingerprints, etc.). An example of this would be withdrawing cash from a bank machine. The only way you can withdraw cash is by having a bank card (something you possess) and a PIN (something you know).
GSI has implemented gShield Authentication in a similar manner. The first of the two components is something you know, your username and password. You will enter these credentials when attempting to log into the system. GShield Authentication has two options for the second component (something in your possession): 1) email address, 2) mobile phone number. There are three options as to what is sent to the second component. The first is a 6-digit authorization code sent either via SMS (text) to your phone, or via a registered work email account. Once you have the received the code, you will enter it on the two-factor authentication page before being granted access to the system.
The last option is a QR code, which is based on your username, the name of the site being accessed and the current date/time. This type of authentication is called a Time-based One-time password (TOTP). After being presented with the QR code, you will scan the code with your mobile device with an app such as Google Authenticator or Authy. After scanning the QR code, the mobile app will present you with a 6-digit authentication code. This code is valid for only a 30 second time period; after which it will be regenerated and presented to you.
According to industry experts, up to 95% of data breaches are perpetrated by hackers that have first stolen users’ credentials and then used those credentials to commit fraudulent activities. Implementing a strong 2FA solution can help eliminate this threat to your JD Edwards system.
Credentials can be stolen through
- Phishing campaigns
- Remote Administration Tool (RAT)
- Brute force attacks
- Same credentials across all accounts
- Easy to guess passwords
- Shoulder surfing
- Information taken from notes on PC