Tiquo
Security & Compliance

Identity & Access Management

Authentication, authorization, and access control

Identity & Access Management

Tiquo protects every login, session, and device through comprehensive identity and access management controls.

Authentication & Identity Security

Tiquo operates two fully isolated identity frameworks to ensure appropriate security for different user types.

Staff Authentication

Enterprise-grade authentication for your team:

FeatureDescription
SSO SupportOAuth, SAML, and OIDC integration
Multi-Factor AuthenticationRequired for sensitive operations
Device TrackingMonitor and manage logged-in devices
Session RevocationInstantly revoke suspicious sessions
Role-Based AccessCustom roles and granular permissions
Audit LogsComplete record of all staff actions
Security ProtectionsCSRF, XSS, and bot protection
Password StandardsNIST 800-63B compliant

Customer Authentication

Secure, frictionless authentication for your customers:

FeatureDescription
Passwordless OTPOne-time password login via email
OIDC/OAuth IDPStandards-based identity provider
Security ProtectionsCSRF and XSS safeguards
Session ManagementSecure token-based sessions

Tiquo ensures access is secure, auditable, and compliant for both teams and customers.

Identity Protection & Account Hardening

Credential Stuffing Protection

ProtectionDescription
New device verificationSigning in from a new device always requires two-factor verification
Automatic OTPIf MFA isn't set up yet, Tiquo automatically sends an OTP to verify identity
Brute-force protectionSmart lockouts and enforced cooldown periods

Sensitive Action Reverification

Tiquo enforces reverification for all sensitive actions:

Users must re-authenticate before making changes such as:

  • Adding a new email address
  • Modifying critical security settings
  • Changing payment information
  • Deleting account data

Security Notifications

Tiquo automatically notifies users whenever a sign-in is detected from an unfamiliar device, location, or network.

Alert Details

Notifications include device type and OS, IP address and geographic region, authentication method, and login timestamp.

Session Management

Staff can view all logged-in devices, login history and locations, and immediately revoke suspicious sessions or force logout from all devices.

These proactive notifications strengthen account security by helping users quickly validate legitimate access or take action against potential unauthorised activity.

Activity Logs

Tiquo provides detailed activity logs for both staff and customers, giving full visibility into every action taken across the platform.

Staff Activity Logs

Configuration Changes

Record all configuration and setting changes

Rollback Support

Enable rollbacks to previous states

User Attribution

Track which user made each change

Audit Trail

Support auditing and accountability

Customer Activity Logs

Capture key account interactions, provide insight into actions and history for support and compliance, and track authentication events and profile changes.

Tiquo's activity logging framework ensures transparency, accountability, and control across all operations.

Accessibility and Inclusive Design

Tiquo ensures accessibility is built into every interaction, enabling all users to navigate, understand, and operate the platform with ease.

Accessibility Standards

StandardDescription
WCAG 2.2Perceivable content, operable controls, clear interfaces
EN 301 549European accessibility requirements
WAI-ARIAInteractive elements compatible with assistive technologies

This inclusive foundation ensures our security, authentication, and operational features remain accessible to every user across devices and contexts.

Ethical Automation & AI Governance

AI-assisted features in Tiquo are developed and deployed with transparency, fairness, and oversight at the core.

NIST AI Risk Management Framework

PracticeDescription
Risk EvaluationAssess potential impacts of AI decisions
Bias MitigationEnsure fair outcomes across automated processes
DocumentationModel inventories and decision records
Behaviour MonitoringReal-world validation of accuracy and integrity

Human-in-the-Loop

Human-in-the-loop governance is applied to critical decisions, ensuring automation enhances security and operational efficiency without compromising user trust or accountability.

Prompt Injection Protections

Tiquo protects AI-assisted workflows against prompt injection and instruction hijacking.

ControlDescription
Context ScopingCustomer data is clearly wrapped and context-scoped
Instruction SeparationSystem instructions are separated from user-supplied content
Field ApprovalOnly explicitly approved fields are exposed to AI models

Deterministic, Grounded Output

Model parameters are controlled to ensure consistent and predictable behaviour, including the use of low temperature settings (0.3) to minimise variability and keep outputs grounded in provided context.

All AI interactions are logged and traceable, supporting oversight, auditability, and ongoing governance. Through structured evaluation and lifecycle monitoring, we ensure that automation remains predictable, well-governed, and aligned with our broader security posture.

En esta página