Skip to main content
Open main menu
  • Log In
  • |
  • Contact Us
Home
  • Solutions

    • Top Security Topics

    • Remote Work Security

    • Network Automation

    • HTTPS Content Inspection

    • Zero-Trust Security

    • SD-WAN

    • Industries

    • Education

    • Finance

    • Healthcare

    • Retail & Hospitality

    • More Industries

      ›
    • Organizations

    • Small Business

    • Midsize Business

    • Distributed Enterprise

    • Managed Service Provider

    • Regulatory Compliance

    • GDPR

    • HIPAA

    • KCSiE

    • PCI DSS

    • Unified Security Platform ›
    • Simplify Your Security.
    Person working with a laptop in their lap next to a child watching a tablet
    Secure Your Remote Workforce During COVID-19.

    Get Resources

  • Products & Services

    • Network Security

    • Security Services

    • Firewall Appliances

    • Cloud & Virtual Firewalls

    • Management

    • Reporting & Visibility

    • Multi-Factor Authentication

    • Authentication Service

    • Cloud Management

    • Mobile App

    • Hardware Token

    • Secure Wi-Fi

    • Wireless Access Points

    • Wi-Fi in WatchGuard Cloud

    • Reporting & Visibility

    • Wi-Fi Use Cases

    • Tabletop Wi-Fi Appliances

    • Endpoint Security

    • Protection, Detection & Response

    • Security Modules

    • Security Operations Center

    • DNS-Level Protection

    • Technology Ecosystem

    • Integrations

    • View All Products

      ›
  • Resources

    • Help Me Research

    • Webinars

    • White Papers

    • Datasheets & Brochures

    • Case Studies

    • All Resources

      ›
    • Help Me Choose

    • UTM vs NGFW

    • WatchGuard Appliance Sizing Tool

    • Compare WatchGuard Appliances

    • Help Me Buy

    • How to Buy

    • Demos & Free Trials

    • Sales Promotions

    • Find a Reseller

    • Online Store (Renewals Only)

    Internet Security Report Resource
    Internet Security Report
    The Latest Malware & Internet Attack Trends

    Get the Report

  • Partners

    • Become a Partner

    • Channel Partner Program

    • Benefits for the MSP

    • Getting Started as a Partner

    • Join the WatchGuardONE Program

    • Partner Resources

    • WatchGuard Cloud for Partners

    • Unified Security Platform for Partners

    • Specializations & Certifications

    • Partner Tools

    • Partner Success Stories

    • Find A Partner

    • Find a Reseller

    • Find a Distributor

    Handshake with images of people superimposed inside the silhouette
    Become a WatchGuardONE Partner Today

    Join Now

  • News

    • WatchGuard News

    • Press Releases

    • Press Coverage

    • Corporate News Blog

    • Media Contacts

    • Awards & Reviews

    • About WatchGuard

    • About Us

    • Leadership

    • Social Responsibility

    • Careers

    WatchGuard Careers
    Your new team is waiting for you

    Join Team Red

  • Support

    • Technical Resources

    • Technical Search

    • User Forums

    • Technical Documentation

    • Product & Support Blog

    • Software Downloads

    • Security Portal

    • Serial Number Lookup

    • Training

    • Certification

    • Training Schedule

    • Locate a Training Center

    • Video Tutorials

    • Support Services

    • Hire an Expert

    • Support Levels

    • Additional Support Services

    • Security Advisory List ›
    • Status Dashboard ›
    Manage Your Support Services
    Products, user profile, cloud services, and more

    Log In

  • Try Now

AuthPoint User Inheritance

Work Easier with MFA User Inheritance

MSP administrators need to fluidly move between multiple subscribers' networks and devices. When customers are protected with MFA, this can lead to excessive permission settings, MFA tokens, and license expenses. AuthPoint's user inheritance feature enables the MSP administrators and analysts to use their own AuthPoint tokens to access their customers' systems so that they can perform MSP tasks without needing to allocate and pay for a MFA licenses in each customer account.

Try Authpoint Today!

Start Demo
Blue arrows pointing down and to the right

A Feature Designed for MSPs

The AuthPoint user inheritance feature allows you to reduce operating costs and create more flexibility for you and your team when it comes to managed customer accounts. Give more control to your staff without spending more on additional MFA licenses or exposing your MSP business to a cyberattack.

Blue wooden person shape connected to unpainted wooden people by a network of lines

How It Works

AuthPoint MFA offers user inheritance features to managed service providers to improve management capabilities without bypassing authentication security. MSP analysts can be inherited into the subscriber account if approved by the customer. This adds a great layer of flexibility and efficiency, as inherited MSP staff can be included in authentication policies within the managed account, without the need to add more tokens or user licenses.

Hands on a keyboard with a large white US Dollar symbol in front

AuthPoint MFA Fits Your Business

AuthPoint offers an unbeatable all-inclusive price structure per user, instead of per token or feature. Learn more about the use cases that can help you grow your MSP business.

Get Details >

Business people standing in an open air lobby, shaking hands and chatting

Inspired by Partner Feedback

We listened to our current MSPs and enabled the following capabilities with the user inheritance feature:

  • MSP analysts can get access to managed accounts without additional set-up or token provisioning
  • No additional licenses are charged to MSPs or customers
  • MSP analysts may use their own token, provisioned by the MSP tenant, for ALL customer accounts
  • MSP analysts can be added to authentication policies, just as any other customer account

Downloads & Resources

Solution Brochure: MFA That’s Powerfully Easy
Understanding the cost of MFA infographic
Infographic: AuthPoint Pricing Infographic
Datasheet
AuthPoint
White Paper: AuthPoint
 

AuthPoint fits your business.

Discover More

Solutions

  • Regulatory Compliance
  • Industries
  • Organizations

Products & Services

  • Security Services
  • Network Security
  • Multi-Factor Authentication
  • Endpoint Security
  • Compare Appliances
  • Product List & SKUs

About WatchGuard

WatchGuard has deployed nearly a million integrated, multi-function threat management appliances worldwide. Our signature red boxes are architected to be the industry's smartest, fastest, and meanest security devices with every scanning engine running at full throttle.

 

Resource Center

  • Webinars
  • White Papers
  • Case Studies
  • Product Resources
  • Technical Briefs
  • Events
  • Visio Icons
  • Media & Brand Kit
  • Sales Promotions
  • Network Security Glossary

GET IN TOUCH

  • Global Headquarters
    505 Fifth Avenue South, Suite 500
    Seattle, WA 98104, United States
  • Phone
    1.800.734.9905 US & Canada
  • Contact Us

About Us

  • Leadership
  • Why Buy Red
  • Press Releases
  • Press Coverage
  • Corporate News Blog
  • Awards & Reviews
  • Upcoming Events
  • Careers

Global Sites

  • English
  • English UK
  • Deutsch
  • Español
  • Français
  • Italiano
  • Português do Brasil
  • 日本語

Support

  • Support Center
  • Product & Support Blog
  • Knowledge Base
  • User Forums
  • Technical Documentation
  • Software Downloads
  • Security Portal
  • Training & Certification
  • Support Services
  • Manage Email Preferences

Social Media

LinkedIn Twitter Facebook

Copyright © 1996-2022 WatchGuard Technologies, Inc. All Rights Reserved.

  • Terms of Use
  • Privacy Policy
  • Cookie Policy
  • Export Compliance

Main menu (Responsive)

  • Solutions
  • Products & Services
  • Resources
  • Partner Program
  • News
  • Careers
  • Contact Us
  • Portal Login
  • Try Now