E-Lock introduces AI powered Adaptive Multi-factor Authentication

Analyses user risk profiles | Invokes right number and types of authentication factors | Reduces friction with low-value assets | Protects high value assets | Positive user experience

E-Lock AdaptAuth

E-Lock AdaptAuth is an AI-powered Adaptive Multi-factor Authentication solution. AdaptAuth uses a combination of real-time evaluation of contextual factors and statically configured authentication policies to determine the selection and flow of MFA factors for every individual authentication request.

This is achieved by building a risk profile for every user by analyzing past authentication attempts and behavioral patterns. The extent of deviation from such patterns invokes additional MFA factors until desired levels of identity assurance are achieved.

Through such intelligent adaption of authentication flows AdaptAuth achieves the right balance between security and user experience.


How it works

Identity and Access Management

Identity and Access Management (IAM)

Identity and access management (IAM) in enterprise IT is a discipline which allows authorized individuals to access right resources at right time for right reasons.


  • Single sign-on (SSO)
  • Multi-factor authentication
  • Identity federation
  • Central policy management
  • Multi-step authentication
  • Stepped-up authentication
  • Custom workflows
  • User consent management
Multi-factor Authentication

Multi-factor Authentication (MFA)

E-Lock MFA is a fully configurable authentication flow for your business and security requirements

Multiple Authentication Mechanisms

  • Email / SMS OTP
  • App-based OTP
  • FIDO 2.0
  • Certificate Authentication
  • Fingerprint Recognition
  • U2F
Adaptive Multi-factor Authentication

Adaptive Multi-factor Authentication (AMFA)

E-Lock AMFA is an AI-Powered Adaptive Multi-factor Authentication that analyses user risk profile and automatically adapts the types and flow of authentication factors.

E-lock AMFA achieves the right balance. Analyses user risk profiles and invokes the right number and types of authentication factors. Reduces friction with low-value assets. Protects high value assets all while maintaining a positive user experience.

E-Lock AdaptAuth Building Blocks

Authentication Server

AdaptAuth Authentication Server

Provides essential functionalities of an authentication server. Manage user identities, implement basic authentication, 2FA and Single-Sign On (SSO).

AdaptAuth Multi-factor Authentication

AdaptAuth Multi-factor Authentication

Custom authentication flows based on different business requirements. Select from multiple ready-to-use authentication factors beyond basic authentication.

Policy manager

AdaptAuth Policy Manager

Configure authentication policies based on organizational requirements.

Risk profile

AdaptAuth Risk Profile

Our AI-powered anomaly detection and classification mechanism evaluates risk associated with each authentication attempt based on numerous context parameters such as IP addresses, geo-locations, device signatures and user behaviour patterns.

Device Signature

AdaptAuth Device Signature

A device registration, identification, remembering and tracking mechanism to allow safer access from anywhere both for devices issued by organisation and BYOD.

AdaptAuth Dashboard

AdaptAuth Dashboard

Real-time monitoring and reporting of authentication requests and events.

MFA factors supported by AdaptAuth

app-based authentication

App-based OTP

certificate-based authentication

Certificate Authentication


Email/ SMS OTP

fingerprint-based authentication

Fingerprint Recognition

FIDO 2.0 authentication

FIDO 2.0

AdaptAuth Advantage

  • Reduced reliance on passwords and other single-factor authentication methods
  • Improved user experience and reduced friction in authentication flows
  • Seamless switching between enterprise apps with Single Sign-On
  • Real-time monitoring and reporting of authentication events
  • Save system admin and IT hours with self-service user enrollment
  • Efficient and cost-effective way to secure enterprise applications
  • Digital Signature Certificate & PKI-based authentication

Open Web Standards

OpenID connect logo
UMA logo
oauth logo
FIDO certified U2F

Get in touch

Fill in the details below to let us know about your requirements