Trusted by leading banks & fintechs
Complete Spectrum of Strong Authentication Methods
Cipher AFA dynamically adjusts authentication methods in real time balancing security with convenience and ensuring full RBI compliance.
- Passkeys + Biometrics
- Swipe2Pay
- Super-PIN
- Risk-Based Authentication
- Other Methods
- Uses public/private key pairs - secured at device level
- Compliant with FIDO2/WebAuthn standards
- Faster, frictionless authentication combining biometric and device possession
- Universally accepted standard
- Frictionless in-app authentication
- No dependency on cellular network
- Device-bound. Highly secure
- Integrated into mobile SDK
- Time-synched, dynamic in-app codes
- Works offline; no dependency on cellular network
- Highly secure - phishing resistant & reduces credential replay risk
- Meets RBI's dynamic non-reusability criteria
- Assesses risk using context signals like amount, device, location, and behavior
- Escalates to stronger factors when anomalies are detected
- Reduces friction for low-risk and repeat transactions
- Maintains full audit visibility for compliance and dispute resolution
-
SMS OTPs
-
Email OTPs
-
Wearables
-
Beneficiary Trusted Authentication
-
PINs and Passwords
Cipher AFA Functional Capabilities
Authentication Engine
Core decisioning engine that converts security policy into real-time actions. Evaluates each request and determines how authentication should proceed, selecting the right plan, enforcing required factors, and validating identity attributes.
Authentication Plans
Lets you tailor authentication to context. Supports scope-based plans based on intent (login, add beneficiary, change limits, high-value CNP etc.) and risk-based dynamic plans that adjust factor strength based on transaction risk.
Multi-factor Authentication Framework
Flexible execution layer that combines multiple authentication factors i.e. biometrics, passkeys, dynamic PINs, OTPs and more in any required sequence. Ensures factors are distinct and dynamically selected, meeting RBI standards while minimizing friction.
Identity & Profile Management
Maintains a unified identity layer that tracks customer profiles, AFA preferences, devices, behavioral patterns, and full audit history. Ensures that authentication reflects who the customer is, how they typically behave and provides complete auditability for every decision.
Authentication Methods Catalog
Extensive library of authentication methods i.e. Passkeys, Swipe2Pay, SuperPIN, biometrics, TOTP, OTP-based mechanisms, trusted-beneficiary flows, risk-based challenges, and more. Every method can be invoked independently or combined in dynamic plans.
Trusted. Seamless. Built for Banks
Fully RBI AFA compliant
End-to-end compliance with RBI guidance, configurable modalities, audit trails and regulator-ready reports.
Infinitely scalable & reliable
Cloud-native, multi-region deployment with autoscaling and enterprise SLAs.
Richest catalog of strong methods
Passkeys, FIDO, Super-PIN, Swipe2Pay, wearables, TOTP, SMS/Email OTPs and more.
Zero-trust security
Continuous verification of user, device and channel — preventing fraud proactively.
Privacy-by-design
Minimal data footprint, encryption at rest & in transit, and data residency controls.
Seamless integration
APIs, SDKs and prebuilt connectors for core banking, card processors and payment gateways.
Shared or dedicated deployment
Flexibility in deployment - supports shared cloud environments or fully isolated tenant setups for enhanced control.
Fast go to market
Prebuilt flows, SDKs, and configuration tools that enable rapid rollout in as little as four weeks, without heavy engineering effort.
Accredited for Trust & Security
Works on All Networks
Frequently Asked Questions
Yes. Cipher AFA is fully compliant with RBI's guidelines on risk-based, adaptive authentication. It supports configurable modalities, audit trails, and regulator-ready reports.
Absolutely. Banks can take a phased approach, using OTP for lower-risk flows while progressively adopting phishing-resistant methods like passkeys, biometrics, or trusted device tokens.
Yes. Cipher AFA can work with any existing risk engine via APIs, or you can use Cipher's built-in risk orchestration logic. This flexibility ensures minimal disruption to existing security workflows.
Cipher AFA is available as a cloud-native platform, deployable on Zeta's managed cloud or your preferred private cloud environment. (Note: On-premise deployment is not supported.)
Cipher follows a privacy-by-design framework, ensuring minimal data storage, encryption at rest and in transit, and compliance with local data residency and privacy regulations.
Yes. Cipher AFA is built on a multi-tenant, horizontally scalable architecture that can handle over 1 million transactions per second, proven in production at several large issuers.
No. Cipher AFA has been live in production since 2015, powering authentication at scale for several leading banks and fintechs. Zeta has continuously innovated on this platform, adding new authentication methods, risk-based orchestration, and phishing-resistant capabilities in line with evolving RBI and global standards.