{"id":10124,"date":"2025-08-18T08:41:04","date_gmt":"2025-08-17T23:41:04","guid":{"rendered":"https:\/\/www.dualauth.com\/blog\/work-locked-by-security-innovated-with-passwordless-yuanta-securities\/"},"modified":"2025-09-01T17:49:35","modified_gmt":"2025-09-01T08:49:35","slug":"work-locked-by-security-innovated-with-passwordless-yuanta-securities","status":"publish","type":"post","link":"https:\/\/www.dualauth.com\/en\/blog\/work-locked-by-security-innovated-with-passwordless-yuanta-securities\/","title":{"rendered":"Work Locked by Security, Innovated with Passwordless: Yuanta Securities"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10124\" class=\"elementor elementor-10124 elementor-9019\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9139124 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9139124\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6e35c57\" data-id=\"6e35c57\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d47ffb elementor-widget elementor-widget-text-editor\" data-id=\"5d47ffb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Work Locked by Security<\/h3><p>Due to their nature, securities firms operate a wide variety of business systems simultaneously. Every morning, employees had to log in to multiple systems, including Windows PCs, NAC (Network Access Control), email, groupware, and business portals. The problem was that each system had a different login method. Some required complex password rules, while others enforced periodic password changes. As a result, employees wasted time complying with security procedures, and an environment focused solely on security ended up suppressing productivity.    <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dba735c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dba735c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-21a10dd\" data-id=\"21a10dd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-32243d9 elementor-widget elementor-widget-text-editor\" data-id=\"32243d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Finding a Fundamental Solution<\/h3><p>To address these structural issues, Yuanta Securities explored transitioning to a passwordless environment. The technology they ultimately chose was the internationally standardized passwordless solution, AutoPassword. AutoPassword stood out during the comparison with various alternatives for several reasons:  <\/p><ul><li>No Additional Hardware Required: Unlike conventional biometric authentication technologies that require sensors on every PC, AutoPassword leverages the biometric sensors already built into employees\u2019 smartphones.<\/li><li>Compliance with International Standards: By adopting the mutual authentication method based on the ITU-T X.1280 standard, AutoPassword ensured both security and scalability.<\/li><li>Wide Applicability: From PC logon to web applications and network authentication, it could be consistently applied across all systems operated by banks and securities firms.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9113472 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9113472\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-67b3418\" data-id=\"67b3418\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96c2c0c elementor-widget elementor-widget-text-editor\" data-id=\"96c2c0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Rebuilt Authentication System with AutoPassword<\/h3><p>Yuanta Securities went beyond simply removing passwords and restructured its entire authentication system around AutoPassword.<\/p><ul><li>Integrated Web Applications: By leveraging SAML and OAuth2 protocols provided by AutoPassword Access Manager, various existing web-based business applications were unified into a single SSO environment. Employees now only need to log in to the portal once, and email, groupware, and other business systems are automatically connected. <\/li><li>Extended to Windows Applications: The passwordless environment was extended beyond the web to desktop applications via WinSSO. When employees log into Windows OS using AutoPassword, all subsequent PC-based business applications log in automatically. Access to key applications is optimized to be available within one minute after Windows logon, ensuring both security and convenience.  <\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b79b56b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b79b56b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38ff611\" data-id=\"38ff611\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b38203 elementor-widget elementor-widget-image\" data-id=\"7b38203\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"384\" src=\"https:\/\/www.dualauth.com\/wp-content\/uploads\/AAM_APE_Diagram_Blog-Page-1-1024x491.jpeg\" class=\"attachment-large size-large wp-image-9298\" alt=\"\" srcset=\"https:\/\/www.dualauth.com\/wp-content\/uploads\/AAM_APE_Diagram_Blog-Page-1-1024x491.jpeg 1024w, https:\/\/www.dualauth.com\/wp-content\/uploads\/AAM_APE_Diagram_Blog-Page-1-300x144.jpeg 300w, https:\/\/www.dualauth.com\/wp-content\/uploads\/AAM_APE_Diagram_Blog-Page-1-768x368.jpeg 768w, https:\/\/www.dualauth.com\/wp-content\/uploads\/AAM_APE_Diagram_Blog-Page-1-1536x736.jpeg 1536w, https:\/\/www.dualauth.com\/wp-content\/uploads\/AAM_APE_Diagram_Blog-Page-1-2048x982.jpeg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-436d5ed elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"436d5ed\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-45b42f7\" data-id=\"45b42f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5459c4a elementor-widget elementor-widget-text-editor\" data-id=\"5459c4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Impact: Balancing Security and Productivity<\/h3><p>The effects Yuanta Securities experienced after implementing AutoPassword were clear: <br>Increased Employee Productivity: Employees no longer waste time on login procedures and can focus on their core tasks. <\/p><ul><li>Enhanced Security: By eliminating passwords at the source, phishing, pharming, and man-in-the-middle attacks are blocked.<\/li><li>Cost Savings: Utilizing employees\u2019 smartphones without additional hardware enabled an economical and efficient transition.<\/li><li>Flexible Scalability: Adopting an international standard-based solution allows for easier integration with future systems.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fa4a4ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fa4a4ce\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-449accc\" data-id=\"449accc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71cd8f9 elementor-widget elementor-widget-text-editor\" data-id=\"71cd8f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Conclusion<\/h3><p>The work environment for employees who once spent their days \u201clocked by security\u201d has now transformed. Instead of dealing with complex passwords, a single smartphone approval completes the authentication process. This securities firm\u2019s case demonstrates that security and convenience are not opposing values\u2014they can be achieved simultaneously with the right technology. Transitioning to passwordless authentication with AutoPassword is not just a login improvement; it is a step toward digital transformation across the entire enterprise.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Restructuring Enterprise-wide Authentication with AutoPassword to Enable Seamless Web Application Integration and Flexible Scalability<\/p>\n","protected":false},"author":12,"featured_media":9652,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2,4],"tags":[13,15],"class_list":["post-10124","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-customer-case-studies","category-industry-news","tag-front-page","tag-partner"],"jetpack_featured_media_url":"https:\/\/www.dualauth.com\/wp-content\/uploads\/blog_thumbnail.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.dualauth.com\/en\/wp-json\/wp\/v2\/posts\/10124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dualauth.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dualauth.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dualauth.com\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dualauth.com\/en\/wp-json\/wp\/v2\/comments?post=10124"}],"version-history":[{"count":1,"href":"https:\/\/www.dualauth.com\/en\/wp-json\/wp\/v2\/posts\/10124\/revisions"}],"predecessor-version":[{"id":10125,"href":"https:\/\/www.dualauth.com\/en\/wp-json\/wp\/v2\/posts\/10124\/revisions\/10125"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dualauth.com\/en\/wp-json\/wp\/v2\/media\/9652"}],"wp:attachment":[{"href":"https:\/\/www.dualauth.com\/en\/wp-json\/wp\/v2\/media?parent=10124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dualauth.com\/en\/wp-json\/wp\/v2\/categories?post=10124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dualauth.com\/en\/wp-json\/wp\/v2\/tags?post=10124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}