PEIG is the client side app (a software authenticator) for ADUCID authentication technology – an innovative strong authentication solution without passwords, certificates, HW tokens, text messages or any other OTPs.
With PEIG (and ADUCID) you don’t need to remember any complicated passwords or retype any verification codes. ADUCID uses mutual authentication with strong cryptography to achieve the highest levels of security while its automated processes make user experience straightforward and hassle-free.
Features
Automatic login with mutual authentication (PEIG verifies authenticity of the server to eliminate phishing)
Use with unlimited number of user credentials to unlimited number of ADUCID servers
Secure authentication even from unprotected/unknown devices and public wireless networks without fear of compromising credentials
Self-service functions: credentials back-ups, replicas and their recovery
Authentication and cryptographic processes fully automated
What's new in version 4.3.5
PEIG is the client side app (a software authenticator) for ADUCID authentication technology - an innovative strong authentication solution without passwords, certificates, HW tokens, text messages or
PEIG is the client side app (a software authenticator) for ADUCID authentication technology - an innovative strong authentication solution without passwords, certificates, HW tokens, text messages or any other OTPs.
With PEIG (and ADUCID) you don’t need to remember any complicated passwords or retype any verification codes. ADUCID uses mutual authentication with strong cryptography to achieve the highest levels of security while its automated processes make user experience straightforward and hassle-free.
Features
Automatic login with mutual authentication (PEIG verifies authenticity of the server to eliminate phishing)
Use with unlimited number of user credentials to unlimited number of ADUCID servers
Secure authentication even from unprotected/unknown devices and public wireless networks without fear of compromising credentials
Self-service functions: credentials back-ups, replicas and their recovery
Authentication and cryptographic processes fully automated