A XentraNET Identity Product

Secure Access
Made Easy

Eliminate passwords and stop unnecessary MFA friction. X-Auth evaluates risk in real-time — seamless access for legitimate users, hard stops for threats.

x-auth.js — risk-based access in 10 lines
import { XAuth } from '@xentranet/x-auth';

const xauth = XAuth.init({ tenant: 'your-app' });

// Evaluate risk on every request — device, location, behavior, network
const { riskLevel, session } = await xauth.evaluate(req);

// Only challenge when the signals demand it
if (riskLevel === 'high') {
  await xauth.stepUp({ method: 'biometric' });
}

// Low risk? Let them through. Seamlessly.
return session.authorize(req);
The Threat
29%
of U.S. adults experienced account takeover in 2024
80%+
of data breaches involve compromised credentials
The Solution
Zero
instances of unauthorized access reported by X-Auth clients
The ROI
>60%
reduction in helpdesk costs for organizations on XentraNET
Section 2 — The Problem

Don't Scare Your
Customers Away

Static authentication treats every login the same. That's not security — it's friction theater.

"Why are you asking for an SMS one-time code when I just want to log in and check my debit balance from the same home computer I use every single time?"

That's your customer. Frustrated. Abandoning your app. Traditional authentication blasts every user with MFA hurdles regardless of how well you know them.

Dynamic, risk-based authentication changes that. X-Auth evaluates a live trust score on every request — device reputation, behavioral patterns, location, and network signals — continuously, not just at login. As part of a Zero Trust framework, every access attempt is verified in real-time.

Legitimate users glide through. Threats get stopped. Make accessing your system a low-friction experience for the good citizens of the internet, and a wall for everyone else.

Section 3 — Risk-Based Authentication

The Right Response
for Every Risk Level

X-Auth evaluates both the identity signals behind a request and the sensitivity of what's being accessed — then matches the friction to the actual risk.

LOW RISK

Seamless Access

e.g. login request for read-only access — trusted identity signals and low-sensitivity operation.

  • Trusted device fingerprint
  • Recognized IP & location
  • Consistent behavioral pattern
  • Low-sensitivity resource
✓ Instant access granted
MEDIUM RISK

Soft Step-Up

e.g. report generation for sensitive data — elevated sensitivity or mild identity signal deviation.

  • Unrecognized browser or OS
  • Access outside normal hours
  • Sensitive resource requested
  • Moderate anomaly score
→ SMS OTP, magic email link, or FIDO2
HIGH RISK

Strong Step-Up

e.g. payment attempt — high-value operation, suspicious signals, or both.

  • High-value or irreversible action
  • Unknown device or flagged IP
  • Behavioral anomaly detected
  • Credential stuffing pattern
⛔ Push or FIDO2 with knowledge or possession factor
Section 4 — Intelligence Engine

Every Signal.
Evaluated in Real-Time.

X-Auth ingests four categories of signals continuously to build a live trust score for every session — not just at login.

🖥

Device Reputation

Each device is fingerprinted and scored against historical fraud patterns and browser entropy. New or anomalous devices are flagged before a credential is ever entered.

device fingerprint fraud history browser entropy
🧠

Behavioral Biometrics

AI/ML models build a behavioral baseline for each user — typing cadence, mouse dynamics, touch pressure, and navigation patterns. Deviations trigger escalation automatically.

typing cadence mouse dynamics touch pressure AI/ML
🌐

Network Risk

IP reputation, geo-fencing, traffic velocity analysis, VPN detection, and Tor exit node identification guard against proxy abuse and distributed credential attacks.

IP reputation geo-fencing VPN detection Tor detection
👤

User Behavior

Session duration, access times, resource access patterns, and privilege escalation attempts are monitored continuously throughout the session — not just at login.

anomaly detection continuous auth privilege monitoring
Section 5 — Core Identity Services

Identity, Top to Bottom

Risk intelligence is the foundation. Authentication and authorization are the execution layers that act on it.

Adaptive AuthN

Passkeys, passwordless, WebAuthn, FIDO2, and Magic Links through a single SDK. Authentication that adapts in real-time based on the live risk score — across every major platform.

Passkeys Passwordless WebAuthn FIDO2 Magic Links

Policy-as-Code AuthZ

Fine-grained RBAC and ABAC enforced at the edge via Open Policy Agent (OPA). Define permissions as code, deploy globally, and enforce with near-zero latency.

RBAC ABAC OPA Edge Enforcement

Risk Intelligence

Continuous AI/ML risk scoring built for Zero Trust architectures. Ingest signals, compute trust, and respond — all before the request is served. ATO protection and bot mitigation included.

AI/ML Scoring Zero Trust ATO Protection Bot Mitigation
Section 6 — Compliance & Trust Center

Built for Regulated Industries

From fintech startups to enterprise infrastructure — X-Auth is the foundation of digital trust.

SOC 2 Type II ISO 27001 GDPR Ready HIPAA Compliant PCI DSS
Zero

instances of unauthorized access reported by X-Auth clients

Section 7 — Pricing

Start Free.
Scale Confidently.

No credit card required for the Developer tier. Full risk intelligence included on every plan.

Developer
Free forever
For side projects and early-stage MVPs. Up to 5,000 MAU.
  • Up to 5,000 monthly active users
  • Risk-based authentication
  • Passwordless & social login
  • Basic RBAC
  • Community support
Get Started Free
Enterprise
Custom / yr
Dedicated infrastructure, custom throughput, and 24/7 security response.
  • Dedicated cluster deployment
  • Custom risk policy engine
  • SSO & SCIM provisioning
  • Compliance reporting
  • SLA guarantees
  • 24/7 security response team
Contact Sales