Trigger OTP Only When Risk Demands It
Why force users through MFA every time? With Keymate's risk-adaptive authenticator, one-time passwords are requested only when contextual conditions indicate elevated risk—like login from an unusual IP, time window, or location.
Risk-Aware OTP Challenge Triggered by Real-Time Conditions
Why It Matters
MFA fatigue is real. Users grow tired of repetitive, unnecessary authentication prompts. Keymate's Event-Based OTP Authenticator enables a Risk-Adaptive Access Control (RADAC) model by:
- Evaluating IP, time of day, device, and geolocation before triggering OTP
- Reducing friction during low-risk logins
- Enhancing protection for sensitive operations or suspicious behavior
- Integrating seamlessly into Keycloak login flows
This improves security without compromising user experience.
OTP When It Matters—Not When It Doesn't
When a user logs in:
Risk-Adaptive OTP Challenge
This fine-grained control results in a smarter, more secure IAM flow.
Example: OTP is only triggered when the session context meets certain risk criteria.
Key Components:
Extension Highlights — What Makes It Unique
Context-Aware Triggers
Evaluates IP, login hour, geolocation, session history, and more
Custom Risk Rules
Define per-tenant or per-user OTP enforcement rules
Seamless Flow Integration
Plug directly into Keycloak's authentication flow
Session Note Recording
Log OTP challenge triggers and reasons
Built-In Compatibility with RADAC
Pairs with Keymate's Risk Engine and DSL rules
Step-Up Ready
Use in conjunction with operation-level OTP policies (e.g. "approve invoice")
Frequently Asked Questions
How to Use This Extension
Follow these steps to enable the Event-Based OTP Authenticator.