Skip to content

Overview of Data Security & Privacy

SiX IDaaS & IAM implements a robust security architecture combining: MFA and OAuth 2.0 to safeguard user data and privacy.

Multi-Factor Authentication (MFA)

  • Enforcement:
    • Step-up verification via:
      • Time-based OTP (Google Authenticator/Authy etc.)

OAuth 2.0 & OpenID Connect

  • Token Security:
    • JWT-based access tokens (signed with RS256)
  • Granular Consent Control:
    • Scope-limited user data access framework

Security Benefits

  • Phishing Resistance: MFA blocks 99.9% of credential theft (Microsoft 2023 report)
  • Data Minimization: OAuth scopes prevent over-permissioning

A leading software solution provider