We developed IPification to improve mobile authentication space in general, while at the same time provide new benefits for mobile operators.
The most important one being – growing operators’ relevance in the mobile authentication and mobile identity space.
Currently, mobile authentication is dominated by other players which do not have a faultless track record of being responsible with user data and security. This is where MNOs using our solution come in – mobile authentication with IPification helps their subscribers keep their data private and secure while seamlessly logging into different apps and services, which are increasingly becoming the most important parts of our lives.
Where other authentication methods like SMS OTP, header enrichment or biometrics are falling short, on either security or privacy or user experience, we are offering a complete package.
On top of that, IPification opens a totally new revenue stream for them. Every successful authentication and every API call can be monetized!
But one of the questions that keep popping up is – how easy is for operators to integrate IPification into their existing IT infrastructure and to connect to their core telco systems.
What does the integration process look like?
Our engineers worked hard to develop a solution which is very easy to integrate and configure on the operators’ side.
Since our solution is Linux-based, we put together all the necessary packages in the repository from which operators can access them. Once we provide them with their unique SSL Client Certificate to access our repository, operators’ IT departments can do everything else themselves. This includes downloading the packages, installing them on their servers, and configuring their core systems to integrate with IPification. And in most cases, all of this can be done within days, and when an MNO has everything ready beforehand – it can be done even faster!
Of course, our team is here to provide full support throughout the whole process, if an operator’s IT people encounter any obstacles while integrating IPification. Once it is up and running, operators can offer service providers the best mobile authentication method currently available.
And to make sure it will work flawlessly, we guarantee 99.99% uptime.
How to prepare for Proof of Concept integration?
Without going into too much detail, I think it’s important for any telco interested in starting their own IPification Proof of Concept project to understand what it takes to integrate our solution with their systems.
First of all, you would need a physical or better yet a virtual machine to install it on. And it does not need to be too powerful, 1 CPU, 4GB of RAM and 100GB of storage is quite enough.
CentOS 7+ or RHEL should be installed on it. The machine should be connected to your internal network, and visible by other components like AAA, GGSN, FW… Also, make sure that you have enabled Internet access for it, or else you won’t get far.
The number of GMID Boxes you should install depends on the size of your network and the number of your subscribers. For the Proof of Concept project, you should start with only one to try our solution fast and see how it works, before moving on to production implementation. Once you start considering that step, you will need to have two GMID Boxes for fail-over and load balancing purposes and to plan to add more as your needs grow.
Why is quick integration important?
In the age when mobile operators are losing revenue and relevance, it is important for them to be able to try any new solution that might change such reality. To be able to test new solutions, quick and easy integration is key.
By enabling MNOs to start IPification Proof of Concept project within days, if not faster, we are helping them to quickly start seeing the benefits from a smooth and secure mobile authentication solution.
Operators will be able to test IPification internally, make sure it works just like we designed it to do, and go live with it so service providers like video streaming companies, e-commerce stores, fintech providers, and others can implement it into their apps and enable fast and secure login for their users.