Skip to main content
Open mobile navigation menu
  • Log In
  • |
  • Contact Us
Home
  • Solutions

    Toggle Menu
    • Cybersecurity Trends

      ›
    • SD-WAN

    • XDR Security

    • Zero Trust Security

    • MSP vs MSSP

    • For Businesses

      ›
    • Industries

    • Regulations

    • Organizations
    • Security Models
    • For MSPs

      ›
    • Security Tech Stack

    • Security Frameworks

    • Cyber Insurance
    • For SOCs

      ›
    • Modern SOC

    • Threat Hunting

    • Unified Security Platform ›
    • Simplify Your Security.
  • Products & Services

    Toggle Menu
    • Network Security

      ›
    • Firewalls

    • Firewall Security Services

    • Secure Access Service Edge (SASE)
    • Network Detection & Response (NDR)

    • Secure Wi-Fi
    • Endpoint Security

      ›
    • Endpoint Detection & Response (EDR)

    • Endpoint Protection & Anti-Virus (AV)

    • Patch Management & Data Security

    • DNS-Level Protection

    • Identity Security

      ›
    • Multi-Factor Authentication (MFA)

    • Single Sign-on (SSO)
    • Hardware Token

    • Platform Security

      ›
    • AI-Powered XDR

    • Cloud Management

    • Compliance Reports

    • Security Operations Center
    • Managed Services for MSPs

      ›
    • Managed Detection & Response

    • View All Products

      ›
  • Research

    Toggle Menu
    • Threat Lab ›
    • Internet Security Report
    • Threat Landscape
    • Ransomware Tracker
    • Secplicity Blog
    • The 443 Podcast
    • Product Resources

      ›
    • On-Demand Webinars

    • White Papers

    • Datasheets & Brochures

    • Case Studies

    • Help Me Choose

    • UTM vs NGFW

    • WatchGuard Appliance Sizing Tool

    • Compare WatchGuard Appliances

    • Find an Integration
    • Help Me Buy

      ›
    • Demos & Free Trials

    • Sales Promotions

    • Find a Reseller

    • Online Store (Renewals Only)

  • Partners

    Toggle Menu
    • Become a Partner

    • Channel Partner Program

    • Benefits for the MSP

    • Getting Started as a Partner

    • Join the WatchGuardONE Program

    • Partner Resources

    • WatchGuard Cloud for Partners

    • Unified Security Platform for Partners

    • Specializations & Certifications

    • Partner Tools

    • Partner Success Stories

    • Find A Partner

    • Find a Reseller

    • Find a Distributor

    Handshake with images of people superimposed inside the silhouette
    Become a WatchGuardONE Partner Today

    Join Now

  • News

    Toggle Menu
    • WatchGuard News

      ›
    • Press Releases

    • Press Coverage

    • Corporate News Blog

    • Upcoming Webinars & Events
    • Awards & Recognition

    • Media Contacts

    • About WatchGuard

      ›
    • Leadership

    • Social Responsibility

    • Careers

    • WatchGuard & Kraken
    • Cyber Defenders of the Deep
    • The Last Stop of Defense
    • Kraken Case Study
    Erin and Shane in rainbow pride decorations
    WatchGuard Careers
    Your new team is waiting for you

    Join Team Red

  • Support

    Toggle Menu
    • Technical Resources

    • Technical Search

    • User Forums

    • Technical Documentation

    • Product & Support Blog

    • Software Downloads

    • Security Portal

    • Training

      ›
    • Certification

    • WatchGuard Learning Center
    • Locate a Training Partner

    • Training Schedule

    • Video Tutorials

    • Support Services

      ›
    • Hire an Expert

    • Support Levels

    • Additional Support Services

    • Security Advisory List ›
    • Status Dashboard ›
    Person touching icons on a floating screen
    Manage Your Support Services
    Products, user profile, cloud services, and more

    Log In

  • Close search
  • Global Sites

    Français
    Deutsch
    Italiano
    Português
    Español
    日本語
  • Try Now
Close search
  • Solutions
  • Products & Services
  • Research
  • Partner Program
  • Support
  • News
  • Careers
  • Portal Login
  • Contact Us
  • Try Now

AuthPoint User Inheritance

Work Easier with MFA User Inheritance

MSP administrators need to fluidly move between multiple subscribers' networks and devices. When customers are protected with MFA, this can lead to excessive permission settings, MFA tokens, and license expenses. AuthPoint's user inheritance feature enables the MSP administrators and analysts to use their own AuthPoint tokens to access their customers' systems so that they can perform MSP tasks without needing to allocate and pay for a MFA licenses in each customer account.

Try Authpoint Today!

Start Demo
Blue arrows pointing down and to the right

A Feature Designed for MSPs

The AuthPoint user inheritance feature allows you to reduce operating costs and create more flexibility for you and your team when it comes to managed customer accounts. Give more control to your staff without spending more on additional MFA licenses or exposing your MSP business to a cyberattack.

Blue wooden person shape connected to unpainted wooden people by a network of lines

How It Works

AuthPoint MFA offers user inheritance features to managed service providers to improve management capabilities without bypassing authentication security. MSP analysts can be inherited into the subscriber account if approved by the customer. This adds a great layer of flexibility and efficiency, as inherited MSP staff can be included in authentication policies within the managed account, without the need to add more tokens or user licenses.

Hands on a keyboard with a large white US Dollar symbol in front

AuthPoint MFA Fits Your Business

AuthPoint offers an unbeatable all-inclusive price structure per user, instead of per token or feature. Learn more about the use cases that can help you grow your MSP business.

Get Details >

Business people standing in an open air lobby, shaking hands and chatting

Inspired by Partner Feedback

We listened to our current MSPs and enabled the following capabilities with the user inheritance feature:

  • MSP analysts can get access to managed accounts without additional setup or token provisioning
  • No additional licenses are charged to MSPs or customers
  • MSP analysts may use their own token, provisioned by the MSP tenant, for ALL customer accounts
  • MSP analysts can be added to authentication policies, just as any other customer account

Downloads & Resources

Understanding the cost of MFA infographic
Infographic: AuthPoint Pricing Infographic
White Paper: AuthPoint
80% of companies experience security incidents in the Cloud
Blog: Seven Advantages of Cloud Identity
Five Reasons to Transition Away from On-Premises Identity Systems
Blog: Five Reasons to Transition Away from On-Premises Identity Systems
blog
Blog: Why Prioritizing Users Improves Business Cybersecurity
img_partner_blog_Security_of_one
Blog: Single sign-on (SSO), simplify access and protect your business
White Paper: SSO Access Boosts Productivity
White Paper: SSO Access Boosts Productivity
Livewire_Mac_Agent_MFA
Blog: Boost security for your Mac customers against MFA bombing campaigns
More Resources
 

AuthPoint fits your business.

Discover More

  • About Us
  • Contact Us
  • Why Buy Red
  • Careers
  • Product List & SKUs
  • Media & Brand Kit
  • Support
  • Trust Center
  • PSIRT
  • Cookie Policy
  • Privacy Policy
  • Manage Email Preferences
LinkedIn X Facebook Instagram YouTube

Email Us

Global Sites

Français
Deutsch
Italiano
Português
Español
日本語

Copyright © 1996-2025 WatchGuard Technologies, Inc. All Rights Reserved.
Terms of Use | California Collection Notice | Do Not Sell or Share My Personal Information