For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Starling Two-Factor Authentication

Secure and Simple Identity Verification

Enhance security by requiring two-factor authentication to gain access to your network resources. With Starling Two-Factor Authentication, a SaaS-based solution, you can secure your organization and keep users productive. It solves the password problem without the capital costs or increased infrastructure management often incurred with traditional on-premises solutions. With an easy-to-use dashboard for administrators and flexible authentication options for end users, Starling Two-Factor Authentication enables organizations to quickly and easily verify a user’s identity.

Heightens security for virtually any system or application
Simplifies ongoing management by not requiring the infrastructure costs and headache of on premises solutions
Eases users’ adoption by providing simple-to-use authentication options, such as push-to-authenticate, SMS texts and phone calls
Enables rapid helpdesk response to user-authentication issues from any web browser
Mitigates the risk of a security breach from compromised or stolen authentication credentials
Provides a comprehensive audit trail to meet compliance requirements

Features

Easy-to-use Admin Dashboard

Easily manage end-user accounts, generate temporary response codes, and verify the mobile app is working correctly.

RADIUS Agent

Enables organizations to support two-factor authentication on anything that uses the radius protocol for authentication.

Multiple authentication methods

Generate one-time passwords with the app for iOS, Android and Chrome or receive via SMS or phone call.

HTTP Agent

Offers two-factor authentication protection to IIS websites.

Push-to-Authenticate

Let users skip the one-time password by choosing to push-to-authenticate after entering their username and password. This will send an SMS verification to their mobile app asking if they approve or deny the logon request to the application. Once approved, the user will be automatically logged in.

ADFS Adapter

Protect applications that use Microsoft WS-Federation protocol, such as Office 365. Plus, other federation protocols, including SAML 2.0 to support logons for cloud apps like Google Apps and salesforce.com.

Tokens

Options include mobile apps for iOS and Android, Chrome; SMS text; or phone call.

Desktop Login

Enhance your environment by adding two-factor authentication to users’ computers and servers by unifying user logons and strengthening authentication.

Token Branding

Customize tokens on the mobile app to match company branding.

Integrations

Protect your applications, operating systems, network and other resources.

    Starling Two-Factor Authentication

  • Multi-modal offering to protect your network resources.

    Starling Two-Factor Authentication
  • RADIUS Agent

  • Acts as a Radius Server to offer 2FA capabilities to any RADIUS-aware application (i.e. VPN)

    RADIUS Agent
  • HTTP Agent

  • Offer 2FA protection to IIS websites

    HTTP Agent
  • ADFS Adapter

  • Offer 2FA protection to any ADFS enabled application

    ADFS Adapter
  • Desktop Login

  • Offer 2FA protection to the Windows log in process

    Desktop Login

Resources

Starling Connect
Datasheet
Starling Connect
Starling Connect
Extend identity governance and AD/AAD strategy to cloud application onboarding and governance
Read Datasheet
State consolidates agencies into one simplified and flexible identity solution
Case Study
State consolidates agencies into one simplified and flexible identity solution
State consolidates agencies into one simplified and flexible identity solution
See how EST Group helped a U.S. state consolidate 18 agencies into one centralized identity resource and to bring new level of efficiency, individual user accountability and security to the organization
Read Case Study
City realizes its vision of becoming a smart city with One Identity solutions and EST Group
Case Study
City realizes its vision of becoming a smart city with One Identity solutions and EST Group
City realizes its vision of becoming a smart city with One Identity solutions and EST Group
EST Group and One Identity solutions helped a large municipality become a smart city with enhanced security and increased flexibility
Read Case Study
Core transforms business with IDaaS solutions from One Identity
Case Study
Core transforms business with IDaaS solutions from One Identity
Core transforms business with IDaaS solutions from One Identity
Hear what One Identity, award-winning partner Core recommends to easily keep ID systems maintenance and security in top form
Read Case Study
Our cloud strategy enables yours
Our cloud strategy enables yours

01:48

Video
Our cloud strategy enables yours
Watch this short video to hear about our cloud strategy and how we’ve built a cloud platform from which we can enable your organization’s digital transformation.
Watch Video
Akima smooths transition to the cloud for federal agencies
Case Study
Akima smooths transition to the cloud for federal agencies
Akima smooths transition to the cloud for federal agencies
Akima smooths federal agencies’ transition to the cloud
Read Case Study
2022 Identities and Security Survey Results – Understanding The Challenges Fragmented Identity Tools Create For Organizations Security Posture
White Paper
2022 Identities and Security Survey Results – Understanding The Challenges Fragmented Identity Tools Create For Organizations Security Posture
2022 Identities and Security Survey Results – Understanding The Challenges Fragmented Identity Tools Create For Organizations Security Posture
Read survey to learn more about how Identity security is quickly emerging as a top priority to help organizations improve their overall cybersecurity posture. But how do you get from here to there? The path forward isn’t always clear.
Read White Paper
Zero Trust and IT Security – A Global Survey of Security Stakeholders
White Paper
Zero Trust and IT Security – A Global Survey of Security Stakeholders
Zero Trust and IT Security – A Global Survey of Security Stakeholders
Download a copy of the Global IT Security survey results to learn more details about the state of Zero Trust.
Read White Paper

Get started now

Secure your organization and keep your users productive with Starling Two-Factor Authentication