gShield Authentication

gshield authentication

Are you concerned about unauthorized access to your JD Edwards system? System credentials can be acquired through cyber-attacks and other malicious activity including phishing campaigns, malware-trojans, keyloggers, remote administration tools (RAT), brute force attacks, paper notes, and other methods. According to industry experts, up to 95% of data breaches are perpetrated by hackers that have first stolen users’ credentials and then used those credentials to commit fraudulent activities.

GSI’s gShield Authentication protects your organization’s mission critical information in JD Edwards, providing an additional layer of credentialed security when a user is logging in to the system.  GShield Authentication uses two factor authentication (2FA) technology, also known as multi-factor authentication, to provide a second level of validation beyond your JD Edwards username and password credentials.

This second level of authentication is quickly validated by sending a code to the user’s email or mobile phone, or by generating a QR Code using Google Authenticator or Authy.

Capture1

The resulting code is entered on an authentication page before the user is granted access to JD Edwards.

Capture2

gShield Benefits

  • Improved Credentials Security
  • Stronger Data Security
  • Protection for Mission Critical Data
  • Minimally Invasive – One Time User Event
  • Only Product Compatible with JD Edwards

gShield Functionality

  • Two-factor Authentication (2FA)
  • 1st Component: Username and Password
  • 2nd Component: Email Address or Mobile Number
  • 6 Digit Authentication Code/QR Code
  • One-time Event per Device

Two Factor AuthenticationgShield Password Authentication

Two-factor authentication (2FA) was created to prevent unauthorized access to your systems caused by cyber-attacks and other malicious activity. 2FA uses an authentication system to double check your identity when logging into an application or website by utilizing a combination of two separate components of authentication. These components generally fall into three categories: 1) something you know, 2) something you have in your possession, 3) something specific to you (e.g. fingerpri