Morson, founded in 1969 by Gerry Mason, has a rich legacy of fostering talent and innovation. Over the years, it has expanded its presence through strategic acquisitions, including tech recruiter The Bridge and infrastructure recruiter Anderselite. Morson is committed to shaping a better future by nurturing talent and driving innovation.
The Challenge
Morson sought to enhance security measures by integrating Multi-Factor Authentication (MFA), Federated Authentication and Trust this device into its Single Sign-On solution (Gluu). The main challenge lies in seamlessly integrating MFA into existing systems and workflows while ensuring compatibility and addressing potential user resistance. Balancing robust security with user experience required meticulous planning and execution.
What did
Centroxy do
Centroxy played a pivotal role in Morson’s successful Multi-Factor Authentication (MFA) implementation, along with the integration of Federated Authentication and the Trust this Device feature. Conducting a comprehensive analysis, Centroxy meticulously identified and addressed compatibility issues, collaborating closely with stakeholders to align with Morson’s security goals.
Centroxy led the technical implementation, configuring MFA settings and seamlessly integrating it into the user interface and backend systems. Additionally, we orchestrated the integration of Federated Authentication, enabling users to access Morson’s systems using their existing credentials from trusted identity providers. Moreover, we facilitated the implementation of the Trust this Device feature, enhancing user convenience and security by enabling trusted devices to bypass certain authentication steps.
Throughout the entire process, we provided invaluable expertise and support, bolstering Morson’s defenses against cyber threats while ensuring a smooth and secure user authentication experience.
The Results
- Seamless integration of MFA into Morson's SSO solution.
- Strengthened security against external cyber threats with Federated Authentication integration.
- Heightened defense against external cyber threats through Trust this Device functionality implementation.
- Strengthened user authentication process.
- Close collaboration with stakeholders ensured alignment with security objectives.
- Expert guidance and support from Centroxy throughout the implementation process.