Overview of Data Security & Privacy
SiX IDaaS & IAM implements a robust security architecture combining: MFA and OAuth 2.0 to safeguard user data and privacy.
Multi-Factor Authentication (MFA)
- Enforcement:
- Step-up verification via:
- Time-based OTP (Google Authenticator/Authy etc.)
- Step-up verification via:
OAuth 2.0 & OpenID Connect
- Token Security:
- JWT-based access tokens (signed with RS256)
- Granular Consent Control:
- Scope-limited user data access framework
Security Benefits
- ✅ Phishing Resistance: MFA blocks 99.9% of credential theft (Microsoft 2023 report)
- ✅ Data Minimization: OAuth scopes prevent over-permissioning