Universal Authentication And Encryption Platform For Securing Next Generation Apps, Systems, Devices And Robots
AUTHENTICATED
ENCRYPTION
Integrate our cutting-edge authentication technology into any Website or App using your favorite framework or Front End Site builder. Our Authentication Technology allows you to build a Single Front End with multiple backends that have access to a wide range of features and capabilities. Plus, you can implement Single Sign-on across systems and devices, making it easy for your users to access the resources they need without having to remember multiple usernames and passwords.
Building Apps using a Single Front End that can make use of multiple backends will be the future of app development when Robots like Chat-GPT take over, but building them can be challenging. Take, for example, the scenario of building a Grocery Web Application that connect to multiple stores or a Peer To Peer Chat Application that can to switch to another Chat provider
Building apps like the ones we described above can be a daunting task, But with HexaEight, it's a breeze! Simply build the Front End using any Site builder or a Static Site Generator, and integrate our authentication using just a few lines of code. Our powerful HTTP Client makes it easy to fetch data via API from any backend provider and save costs by hosting the front end UI on any Static website
With our authorization server, you can authenticate any email address, whether it's for work, personal, or social use, without redirection to an external site. By adding a wildcard setting, your application can easily accept users from any email domain, making it scalable and versatile. Additionally, our authorization server doesn't rely on databases to store policies, ensuring a secure and efficient authorization process.
Multiple backend service providers can implement our powerful Middleware to protect their APIs, while the front-end interface can easily connect to any of the providers' authorization servers and establish secure communication with the providers' APIs using our state-of-the-art Encryption Technology
Authenticate Any User Using Any Email Address Or Any Machine Using A Domain Name Or Resource ID
Use Our Dynamic Authorization Capability Post Authentication Or Plugin your Own Authorization Layer
Enable Application Layer Encryption As Well As Authenticated Encryption Using Our Technology Across Applications
Physically Or Virtually Verify Any User EMail Address Using Our Mobile Application To Prevent Frauds
Encrypt Information To Any User Or Machine By Fetching An Asymmetric Shared Key From Our Platform.
Stolen User And Machine Keys Cannot Be Used By Anyone To Spoof The Identity Of Another User Or Machine
Machine Keys are automatically rotated every 15 minutes and Application Keys are rotated every Month
Use Our Technology To Allow Devices To Establish Direct Secure communication even when they are offline
Enable Authentication in your Java Script App hosted on any Static Web Site
Protect your APIs using our Technology without using any API Keys for authorized access
Our Authentication solution can also protect Applications hosted on plain http protocol
Our Authentication and Token-less solution is completely
Protocol-independent
Users will need to solve an Encrypted QR Captcha before they are granted access to their Login Session.
Users do not need to type any Passwords in the Client Or Browser during login in order to provide maximum security
Cookies can be safely disabled to prevent providers from tracking you since we don't use Cookies
Data can be stored securely across sessions in the local storage using built-in functions offered by our Platform
How Does Our Authentication Work?
HexaEight Sessions Is Our Flagship Technology Solution That Enables Authentication Using Encryption In A Variety Of Web / Mobile Applications, Systems, And Devices. It Uses A Unique Concept Of Token-less Authentication, Relying On Our Patent-pending Encryption Technology To Establish The Identity Of Any User Or Machine.
In Addition, HexaEight Sessions Implements Two-factor Authentication, Using Encrypted QR Codes As An Extra Security Layer To Ensure The Highest Level Of Protection.
HexaEight Sessions can be used in both client and server applications to establish secure communication.
An end user can prove their identity by encrypting information to the server application using HexaEight Session. Similarly the server application uses HexaEight Middleware Session to verify the user's identity and also proves its own identity by sending back encrypted information back to the client application.
HexaEight Sessions Can Also Be Used For Peer To Peer Authentication Like In A Chat Application Or In A Peer To Peer Web3 or Gaming App
Our Technology allows seamless, direct communication between machines using HexaEight Machine Sessions without the need to implement any application.
Our Cloud Platform provides the encryption keys for the source and destination machines, enabling them to establish a secure and authenticated bidirectional communication channel using our cutting-edge encryption technology.
Self Host HexaEight Token Server on any Operating System and Create a Client Application Realm. Apply Authorization Policies To The Client Application Realm
Build A Front End UI And Integrate HexaEight Sessions by pointing to Token Server along with the Client Application ID. Publish your Client Application To End Users
Integrate Our Middleware by pointing to the Token Server. Apply access policies in the Token Server to Protect Your Backend APIs without API Keys
Self Host HexaEight Token Server And Apply Access Policies To Define The Users Who Are Allowed To Login To Your Systems
Integrate Our Authentication Plugin in your Operating System and configure your plugin which will allow users to login to your System using a One Time Pass Code.
Our SDK libraries can be used to build and integrate HexaEight Sessions for establishing secure communication in Devices, Drones and Robots using Raspberry Pi's and using CANBUS SDK in order to allow electronic subsystems to authenticate and securely establish secure communication.
Our Core Technology
HexaEight Encryption
Standard Encryption Techniques like Public Key cryptography use a pair of keys, a public key and a private key, to encrypt and decrypt data. The Public key is used to encrypt the data, while the Private key is used to decrypt it. While this technique ensures the secrecy of the message, it cannot be used to establish the identity of the sender as the Public key can be subject to attacks during the exchange process.
To verify the identity of a user using a public key, a Certificate Authority (CA) must certify the Public key and issue a Digital Certificate. While Digital Certificates and Signatures offer message authenticity, they can be compromised if the private key is misplaced or stolen. In this case, it can be time-consuming to revalidate and issue a new Digital Certificate and Signature
Our Mobile Application
HexaEight Authenticator Is Our Free Mobile Application For Users That Implements HexaEight Authenticated Encryption Technology.
Our Mobile Application Can Be Used To Authenticate And Authorize User Agents, Applications, Machines, Devices and even Robots.
Our Serverless Technology
HexaEight Serverless is our solution that utilizes serverless technology to enable contactless authentication in web applications. If you're looking for a quick and easy contactless login solution for kiosks or registration desks, HexaEight Serverless can meet your needs. However, please note that this solution uses HTTP secure cookies during the authentication process.
Please note that our Authentication service is completely free of charge for unlimited users and it will remain free forever, with no limitations regardless of any number of users, the charges you will incur will depend on the total number of consumed client or machine tokens every month.
In order to understand our pricing, your need to understand the below terminologies and the cost associated with them.
SELF-HOSTED TOKEN SERVER
CLIENT AND MACHINE TOKENS
How Much Does It Cost?
What is the Cost Of Tokens?
If you don't have the infrastructure to host our Token Server, we can host one for you for as low as $3 per month. You can then feed the Rapid API Key and use this Token Server for authentication in Unlimited Applications.
Pricing Use Cases
Assuming you have developed a JavaScript Client Application and have 100 Users accessing a database through one HexaEight Middleware Server (HMS) via HexaEight Sessions from your application.
The cost estimate for this scenario is :
1. Authentication for 100 users = FREE
2. One HexaEight Token Server = ~$3.0
3. 100 User Sessions Fetch HMS Client Token * 0.003 * 30 days = $9.0
4. 1 HexaEight Middleware Session * 0.003 * 100 (users) = $0.3
=========================================================
Total (per month) = $15.2
As an Admin you want all your users to login to 5 Linux Systems using SSH by using HexaEight One Time Password. You deploy a token server and add policies and point your Linux servers to an ldap server so that your team of 50 users can login using their email address. You install HexaEight Authentication Plugin on all the 5 Linux servers so that every time a user tries to login, two machine tokens is fetched, one by the Linux Authentication Plugin and another one by Token Server.
The cost estimate for this scenario is :
5 HexaEight System Plugins * 0.001 * 50 (users) = $0.25 per day
1 Token Server * 0.005 (5 Machine Tokens) * 50 (users) = $0.25 per day
1. One HexaEight Token Server = ~$3.0 per month
2. HexaEight System Plugin = $7.5 per month
3. Token Server Additional cost for Machine Tokens = $7.5 per month
=========================================================
Total (per month) = $18
Assume you have have developed a program that allows 50 IOT devices connected inside a LAN to talk to each other by integrating HexaEight Library. You want keys to be rotated every week and you want offline (without Internet access) communication between the devices and allow them to be online once every week for a very short period of 10 or 15 min.
Every device will fetch the Machine token of all the other devices once every week when online and reuse the machine token for unlimited authentication, encryption and decryption of data. All devices establish a direct connection with each other device over LAN. The cost estimate for this scenario is :
1. 50 Machine Tokens * 50 devices * 4 weeks * 0.001 = $10
=========================================================
Total (per month) = $10