During the development process we leveraged the following technologies:
The whole application is distributed in four sub-applications to work in a synchronized way: Admin, API, Auth (Keylemon-Oasis), Auth, OAuth.
This is the administrator panel of the application for registered companies, as well as site administrators. Here, super-admin can view and manage all the registered companies, all the applications created, all available users, etc.
Also, all the login sessions, user details, and logs/ reports can be accessed and exported. It also consists of reference documentation for all the API end-points with request parameter guidelines and request/response formats.
This is the core of the application, collecting all the API services used throughout the process.
The customer’s website uses the API to initiate processes for any data retrieval, contacting the API within a certain time interval recursively to check for the authentication success and its location details to process/start the user login session.
The access to API end-point needs to have access-token generated with OAuth.
Auth (Keylemon - Oasis)
Auth application is the server that enables face authentication. The application uses Keylemon-Oasis for face authentication.
OAuth application is the authentication layer requirement of the whole application architecture.
A request for basic authentication is made to OAuth server to generate the access token for further access to other application parts like all the APIs on the API server, which is open for public access to block spam requests.
The finished 4-layer application uses facial recognition technology to secure the exchange of information. By incorporating this element, our client’s customers evolve their fraud prevention in a way that effectively confronts the challenges of the digital age. With greater accessibility comes greater vulnerability, and by using a login feature as unique and personalized as facial features, we increase cyber security considerably.
All four layers of the MFA platform work together to form a more secure, more robust fraud prevention system for the client’s consumer base.
We will continue to work alongside the client, providing support for upcoming projects and implementing the technologies necessary to further the client’s vision.