Licensing & Pricing

Subscription Plans

SecureAuth Subscription Plan: Level 1 - Secure

LEVEL 1 – SECURE

$1 / User / Month

Simple MFA for five mission-critical cloud & on-prem apps and resources

Typical Use Cases
  • MFA for 5 mission-critical apps

  • SSO for 5 cloud/on-prem SAML apps
  • User self-service
SecureAuth Subscription Plan: Level 2 - Protect

LEVEL 2 – PROTECT

$3 / User / Month

Add adaptive MFA for every cloud/on-prem app, resource, server, or PC

Typical Use Cases
  • Adaptive MFA for in-house/SaaS apps
  • Real-time login risk assessment
  • Full self-service CIAM use cases
SecureAuth Subscription Plan: Level 3 - Prevent

LEVEL 3 – PREVENT

$6 / User / Month

Biometric auth with real-time threat services – the ultimate in adaptive auth

Typical Use Cases
  • Biometric and passwordless auth
  • MFA for your branded mobile apps
  • Multi-source threat feed service

Compare Authentication Plans

Scroll Right to see all plans  

Single Sign-on (SSO)

SAML
OAuth 2.0 / OpenID / OIDC / WS-Fed / WS-Trust / Form-based / Web token

Multi-factor Authentication (MFA)

SMS / Security Questions / Helpdesk / Voice OTP
3rd party authenticator apps – i.e. Google/Microsoft Authenticator, Duo Mobile, Authy
CAC/PIV card authentication – High-security options for the public sector, government, defense
SecureAuth Authenticate – 6-digit or 8-digit OTP code
SecureAuth Authenticate – Push notifications, Symbol-to-Accept
Link-to-Accept (Magic link) – Link-to-Accept to simplify CIAM use cases
Questionnaire as a Factor – User input-driven MFA factor & consent management
SecureAuth Authenticate – Biometric MFA, i.e. with Face ID / Touch ID
FIDO2 WebAuthn – Biometric authentication with YubiKey, Touch ID, etc.

Device-level MFA

MFA-protected RADIUS Server auth – Protect VPN or WiFi access points with MFA
SecureAuth EndpointDesktop MFA for Windows/macOS/Linux
SecureAuth Mobile SDKMFA SDK for your branded app

Adaptive Authentication

Directory LookupUser attribute evaluation, group memberships, user allow/deny lists
Detect anonymous proxies – Anonymizers and proxies incl. TOR
Trusted device evaluation – Simpler auth flows for trusted devices
Improbable travel detection
Location check – Allow or deny access from a given location
Dynamic Perimeter – Trusted location check (time spent within a perimeter)
Custom Allow/Deny IP lists – Incl. countries
Dynamic IP BlockingPrevents password spray and account lockout attacks
Malicious IP blocking – Checks IP against real-time threat feeds of bad IPs
3rd party risk score integration – Ingest and evaluate more threat signals
Phone number trust – Network carrier / Call type i.e. VoIP / Number port status evaluation
Unusual user behaviorPattern analytics

Miscellaneous

Audit & Logging – Integration with SOC and SIEM toolsets
Network security integrations – with PAM, IGA, UEBA tools
Application/system limit

Level 1

Secure

Up to 5

Secure

$1 / User / Month
Contact Sales

Level 2

Protect

Unlimited

Protect

$3 / User / Month
Contact Sales

Level 3

Prevent

Unlimited

Prevent

$6 / User / Month
Contact Sales

Available with all authentication subscriptions

User Self-Service

Save up to 50% on help desk costs with account self-service

  • Self-service password reset
  • Device enrollment during login
  • Self-service profile updates
  • Self-service account unlocking

Simple Administration

Allows to build context-aware, adaptive authentication workflows

  • Reusable adaptive auth policies
  • Global MFA settings & policies
  • Brandable end-user themes
  • Application integration library
  • Reusable dir integration objects

Deployment Options

Delivered as a high-performance SaaS solution or as private cloud

  • High-performance SaaS
  • SaaS/on-prem hybrid
  • Private cloud (virtual appliance)

Identity Store Subscription Plans

Workforce Identity

$24/user/year
Min 500 users

Your non-core workforce and partner identities in a privacy-first cloud directory.

Typical Use Cases
  • Contingent workforce user groups
  • Low-touch partner audiences
  • User data residency compliance

Customer Identity

Call
Min 1000 MAUs

Your global customers managed with PII protections in a developer-first environment.

Typical Use Cases
  • Customers under GDPR, CCPA
  • Right-to-be-forgotten mandate
  • In-house developed customer apps

The World’s Leading Brands Trust SecureAuth

unisys
Estee Lauder

Global 24/7/365 support plans

SecureAuth is dedicated to providing the industry-leading enhanced support ensuring the long term success of your SecureAuth SaaS IAM deployment.

Basic Support Plan

  • 24 hours - 7 days a week coverage
  • Severity 4 (low) - 24 hour response time
  • Severity 3 (normal) - 4 hour response time
  • Severity 2 (high) - 3 hour response time
  • Severity 1 (urgent) - 1 hour response time

Premier Support Plan

  • 24 hours - 7 days a week coverage
  • Severity 4 (low) - 24 hour response time
  • Severity 3 (normal) - 3 hour response time
  • Severity 2 (high) - 2 hour response time
  • Severity 1 (urgent) - 1 hour response time

Mission Critical Support Plan

  • 24 hours - 7 days a week coverage
  • Severity 4 (low) - 24 hour response time
  • Severity 3 (normal) - 2 hour response time
  • Severity 2 (high) - 1 hour response time
  • Severity 1 (urgent) - 30 min response time