Your suggested change has been received. Thank you.

close

Suggest A Change

https://thales.na.market.dpondemand.io/docs/dpod/services/kmo….

back

Dashboard

SafeNet MobilePASS+ authenticators

search

SafeNet MobilePASS+ authenticators

SafeNet MobilePASS+ authenticators

SafeNet MobilePASS+ authenticators requires the STA or STA Premium plan.

The STA Access Management console lists all of the SafeNet MobilePASS+ authenticators deployed to your users and identifies the level of risk associated with the host devices.

Acquisition of risk data requires SafeNet MobilePASS+ 2.0 or later.

View SafeNet MobilePASS+ authenticators

To view a list of SafeNet MobilePASS+ authenticators:

  1. In the STA Access Management console, select the Home tab.

  2. Select the MobilePASS+ Authenticators tab.

    All SafeNet MobilePASS+ 2.0 authenticators display in descending order from the time of last use.

    alt_text

  3. In the summary at the top, select Risk Detected to display the at-risk authenticators only.

    alt_text

SafeNet MobilePASS+ authenticator details

The list of SafeNet MobilePASS+ authenticators includes the following information:

Column Description
Last Used

The time of the last access attempt made with the SafeNet MobilePASS+ authenticator.

UserID / Email

The user ID and email address of the user who made the access attempt.

Authenticator Name The name of the SafeNet MobilePASS+ authenticator that was used for the access attempt. This name is configured by the user in the token settings of the SafeNet MobilePASS+ app.
Device

Name and model information, based on the device's operating system:

  • Android - Brand name, model, and OS version
  • iOS - User-configured name and OS version
  • Windows - Computer name and OS version
App Version

The version of the SafeNet MobilePASS+ application used by the authenticator.

PIN Status

Type of PIN required to authenticate:

  • No PIN
  • User PIN
  • Biometric PIN
  • Server PIN
Risk Detection

The risk associated with the SafeNet MobilePASS+ authenticator. See Risk detection states.

Risk detection states

The risk detection states for each operating system include the following information:

Risk State Description Android iOS Windows
Debug SafeNet MobilePASS+ is running in a debugging environment, exposing all security-relevant data, compromising the token. safe, suspected, or confirmed - safe or confirmed
Hook A function hook or hooking framework was detected which allows skimming of security critical secrets, like token shared secrets or PIN’s. safe, suspected, or confirmed safe, suspected, or confirmed safe, suspected, or confirmed
Jailbreak The mobile device is jailbroken, which allows all OS built-in security mechanisms to be bypassed. Security of the token secrets cannot be guaranteed. - safe, suspected, or confirmed -
Root The mobile device is rooted, which allows all OS built-in security mechanisms to be bypassed. Security of the token secrets cannot be guaranteed. safe, suspected, or confirmed - -

Risk detection state values

  • Safe - no risk detected

  • Suspected - some signals indicated a risk, but the data is inconclusive. Could be a false positive

  • Confirmed - risk is confirmed

Risk detection updates

Android

On Android devices, the application will send the risk data randomly within eight hours of activating the first authenticator. Any updates to the risk detection data will be sent on subsequent application launches or push notification responses, delayed by approximately 30 seconds.

iOS and Windows

On iOS and Windows devices, during the 48 hours following enrollment of the first token, a random check at each application launch determines whether the data will be sent; with a probability of 20%. After 48 hours, risk detection data is sent on each application launch for which a change has been detected.

Data update triggers

Risk detection updates are triggered by:

  • SafeNet MobilePASS+ application upgrade

  • Device operating system upgrade

  • Token information update (new token enrollment, token deletion, token alias change)

  • User PIN change

  • Biometric setting change (enable/disable)

  • Device push setting change (enable/disable push from the device setting)

  • Risk state change (device is hooked, rooted/jailbreak, debugger attached)