KNOWLEDGE BASE
Frequently Asked Questions
Everything you need to know about Pay Factor Authentication and how AuthLN fits your security stack.
GENERAL
PFA is a patented authentication method that attaches a small economic commitment (via Lightning Network micro-payment) to every login attempt. Legitimate users are auto-refunded instantly. Unauthorized attempts forfeit the payment, making credential attacks economically irrational.
Traditional MFA verifies identity through knowledge, possession, or biometrics—all of which can be phished, SIM-swapped, or bypassed by AI. AuthLN adds an economic factor that cannot be socially engineered. Attackers must commit real money per attempt, making large-scale attacks cost-prohibitive.
No. AuthLN sits in front of or alongside your existing IdP (Okta, Microsoft Entra ID, Ping Identity, etc.). It adds economic enforcement without replacing your current authentication stack.
TECHNOLOGY
The Lightning Network is a Layer 2 payment protocol built on Bitcoin that enables near-instant, low-cost micro-transactions. AuthLN uses it as infrastructure for economic verification—not as cryptocurrency speculation. Users never need to own or manage Bitcoin.
No. AuthLN is a cybersecurity product that uses Lightning Network rails as infrastructure—similar to how Visa uses SWIFT for settlement. Users interact with their normal login flow. The economic layer operates transparently in the background.
AuthLN cryptographically binds authentication credentials to the user’s device hardware (TPM/Secure Enclave). Credentials cannot be extracted, replayed, or used from a different device—eliminating credential theft as an attack vector.
Yes. Because the Pay Factor requires real economic commitment per attempt, AI bots and automated attacks face the same cost barrier as human attackers. No amount of AI sophistication bypasses the need to pay.
INTEGRATION
AuthLN integrates with all major IdPs including Okta, Microsoft Entra ID, Ping Identity, Auth0, CISCO Duo, and Google Workspace. We also support custom SAML and OIDC integrations.
AuthLN sends pre-breach telemetry to Splunk, Microsoft Sentinel, CrowdStrike, Elastic, and any SIEM that accepts standard syslog or webhook inputs.
Typical deployments take 2–4 weeks from kickoff to production. AuthLN provides a dedicated integration engineer and documentation for your specific environment.
PRICING & DEPLOYMENT
AuthLN uses a per-authentication pricing model with volume tiers. We offer pilot programs for qualified organizations. Contact us for a custom quote based on your authentication volume.
We offer a guided pilot program rather than a self-serve trial. This ensures proper integration and lets you see real pre-breach telemetry from your environment. Request a demo to get started.
AuthLN is designed to support NIST 800-63-4, PCI DSS 4.0, SOC 2, NIS2/DORA, HIPAA, and CMMC requirements. Our patented approach provides the economic enforcement layer that these frameworks increasingly expect.
Still Have Questions?
Our team is ready to walk you through Pay Factor Authentication and answer any technical questions.