Administer Callsign-protected applications for your enterprise.
Integrate Callsign IDA with your applications via Connectors.
Embed Callsign IDA in your mobile and web apps with our SDKs.
Download our latest SDKs and ready made Connectors.
An overview of a typical installation of Callsign.
1. TRANSACTION REQUEST
The start of the user's journey - at the service provider. User types their username and clicks go.
2. CALLSIGN WORKFLOW
The transaction request is processed by the Callsign Platform and is passed to the Policy Engine.
3. INITIAL POLICY CHECK
The Policy Engine checks to see if basic policy requirements (set by the service provider) are satisfied before passing back to the Callsign platform so send a request to the users device.
4. INTELLIGENCE & AUTHENTICATION
The users responds to the request sent to their device and provides the necessary authentication as required by the Policy Engine. A response is then sent back to the Callsign Platform along with Intelligence (Behavior, Location and Device) analytics.
5. FOLLOW UP POLICY CHECK
The users response along with Intelligence analytics are then processed to determine if the transaction will be approved, denied or if additional authentication is required.
6. TRANSACTION RESPONSE
Callsign forwards the result to the service provider who then approves or denies the transaction.
Integrate Callsign with everything
Integrate with your favourite SaaS Apps, VPN Clients and anything else you can think of.