10.2.2.1.1. Terms and definitions
activation letter
An activation letter is a letter (PDF) usually sent to the user by a trusted mail service.
Activation letters are often used to verify the physical address information supplied during registration, or in situations where an independent and secure digital communication channel has not yet been established.
Airlock 2FA activation letters contain a QR code for the enrollment of an Airlock 2FA app.
Airlock 2FA app
The Airlock 2FA app is our mobile application for authentication and transaction approval. It is available for Android and iOS and can be downloaded from the app stores.
enrollment, Airlock 2FA
Airlock 2FA enrollment is the process of activating an Airlock 2FA app and linking it to an IAM user account. Enrollment can be in the browser (e.g. migration of other 2nd factors to Airlock 2FA) or using an activation letter.
hardware token
A small device whose sole purpose is strong authentication or transaction confirmation.
mobile-only authentication
Another term for single device authentication used in conjunction with Airlock 2FA.
OAuth 2.0
OAuth 2.0 is a standard for access delegation. Clients can act on behalf of users by using bearer tokens for authentication during resource access.
Offline QR code
Offline QR code is a type of transaction approval in Airlock 2FA.
A QR code shown in the user's browser is scanned using the Airlock 2FA hardware token (or app) which then displays transaction information and a verification code. The user confirms the process by entering the verification code in the browser.
It allows transaction approval in situations without an internet connection of the smartphone.
Passcode
The passcode method is the simplest authentication method provided in Airlock 2FA. The app displays a one-time code (OTP) that is valid for 30 seconds.
It allows authentication in situations without internet connection of the smartphone.
security gate process
The security gate process is the request-processing component and policy enforcement point of the Airlock Gateway.
In combination with Airlock Anomaly Shield, the security gate process evaluates the anomaly information and may apply actions based on the evaluation result.