RapidIdentity MFA provides broad support for embedded and USB connected RFID readers. Supported devices include embedded, USB, PC Express, and PCMCIA readers from: Dell, Feitian, HID (OMNIKEY), Panasonic, POSH, and more. Additionally, RapidIdentity MFA supports over 40 forms of RFID technology in various devices, including: DESFire, HID iCLASS, Mifare, NFC, HID PROX, and more. Please check the RapidIdentity MFA Client Administrator’s Guide, selected reader datasheet, or contact Identity Automation for the current hardware comparability list.
How RFID works with RapidIdentity MFA
A RFID device contains a module that emits a unique identifier when presented to a RFID reader. RFID devices come in many different form factors and generally support two different frequencies, 125 kHz and 13.56 MHz. The majority of older implementations in the United States use 125 kHz technology while newer implementations use 13.56 MHz. 13.56 MHz technology is generally considered more secure due to mutual authentication between the device and reader and unique card identification numbers. RFID based authentication is considered less secure than contact smart cards or biometrics, but more secure than other forms of authentication. RapidIdentity MFA manages the lifecycle of both 125 kHz and 13.56 MHz devices and the selection of PINs by users.
RFID uses and workflow
RFID devices are in broad use throughout the world for building access and are considered a preferred form of authentication by many organizations seeking to enhance or streamline authentication processes due to RFID’s ease of use and the multi-purpose capabilities. The common workflow for RFID device authentication requires the user to present their device to a connected reader (USB, embedded, PCMCIA, PC Express), RapidIdentity MFA then identifies the user’s information (the user does not have to enter a username) and requests the user to enter their PIN associated with the device; the user then enters their PIN and RapidIdentity MFA validates the two components. Once validated the user is permitted access to the operating system or application.