TraitWare® Authentication

com.traitware.Authentication.Prime

View detailed information for TraitWare® Authentication — ratings, download counts, screenshots, pricing and developer details. See integrated SDKs and related technical data.

Total installs
918(918)
Rating
3.6(2 reviews)
Released
April 16, 2014
Last updated
December 10, 2025
Category
Personalization
Developer
TraitWare
Developer details
Name
TraitWare
E-mail
support@traitware.com
Website
unknown
Country
unknown
Address
unknown
TraitWare® Authentication Header - AppWisp.com

Screenshots

TraitWare® Authentication Screenshot 1 - AppWisp.com
TraitWare® Authentication Screenshot 2 - AppWisp.com
TraitWare® Authentication Screenshot 3 - AppWisp.com
TraitWare® Authentication Screenshot 4 - AppWisp.com

Description

TraitWare® Authentication provides passwordless MFA-inherent access to protected applications, resources, and web sites by employing your mobile device as a “login token” or “authenticator”, eliminating dependence on the use of inconvenient and problematic usernames and passwords or separate hardware tokens. Security is improved because TraitWare was built from the ground up to include 2-factor MFA on every login.

TraitWare® leverages patented technology which “binds” the User’s identity to their Mobile Device. In addition, it relies on your device biometrics and optionally a technology called PhotoAuth, an image-based unlock method, which prevents unauthorized users from accessing the TraitWare App.

TraitWare® allows the User’s Mobile Device to be used as a passwordless multi-factor authenticator where the two factors are: 1) “something you have”, which is the device itself which contains user and device traits; and 2) "something you are" using your device-based fingerprint or “something you know” which is your image-based PhotoAuth Sequence (which functions as a “visual PIN”). For even greater security, TraitWare also offers three-factor authentication, using a combination of device-based fingerprint and a PhotoAuth sequence. Logins can additionally be locked down using admin-controlled geofencing.