There are two aspects of the user management function in the Travesys Platform.
Firstly, for traveller sign up and sign in, Travesys offers a range of options that enable ease of new sign up or existing user data migration.
Secondly, managing administrators, the platform facilitates the creating, modification or restricting access of an administrator’s profile linked to an effective user access control system that limits access to only certain functionality.
Traveller Sign Up & Sign In Options?
We offer a native sign up and sign in option on the platform that collects basic profile information to set up a traveller access to the platform. Passwords and Data are tokenised and stored using Advanced Encryption Standard (AES). The AES is a symmetric encryption algorithm. AES is the industry standard and we use the 256-bit encryption methodology. Symmetric encryption is very fast as compared to asymmetric encryption which is still commonly used
With our Single Sign On (SSO) option we provide an authentication method that enables travellers to securely authenticate with the Travesys Platform using their existing airline credentials. Be it from a loyalty program or from a native IBE sign on function, we simply send a token request to your Identity Service API and in return grant access to the portal
Batch Sign Up
Airlines are able to send us a batch file with an agreed set of data which we then process into the Travesys Identity System. This will generate a one-time email password set link which the traveller will then click on and set a new password. We also have the ability to accept encrypted passwords with the decoding algorithm method in order for the traveller to keep their old passwords in case of migrations into the Travesys Platform
3rd Party Services (OAuth)
OAuth gets rid of the need to store confidential traveller passwords on our server. Instead, the traveller trusts us to access their basic profile information from a 3rd Party service, which handles the authentication. We currently support, Google, Facebook, Twitter and Apple ID OAuth.
Admin User Access Control.
With our granular user access control (UAC) functionality, you will have the ability to configure specific roles, permissions and system functionalities based on business requirements.
Our fully controllable role and module access layering capabilities will allow you to define who gets what access. Furthermore, we offer enhanced optional security features using 2FA via 3rd party Google Authenticator.
In addition, based on needs, we can IP restrict access to only be permitted from allowed fixed IP addresses from within your approved network.
This ensures a safe and secure admin access to authorised personnel only.