Experience Continuous Authentication Live

See the complete Pulse CA framework in action. Real authentication, real metrics, real enforcement—in about 10 minutes.

What You'll Experience

✓ Real Components

  • Auth app from app store (on your phone)
  • Real OIDC authentication flow
  • Live PDP analysis and trust scores
  • Actual policy enforcement

⚙ Simulated for Demo

  • OIDC client application (represents any app like O365, Salesforce, etc.)
  • Sample policies (you'll configure your own in production)

📊 What You'll See

  • Authentication ceremony (Passkey or Auth)
  • Four trust scores updating in real-time
  • Live policy enforcement when you trigger an exception
  • Complete session lifecycle

How This Demo Works

Understanding what's real and what's simulated

Your Phone (Real)

The Auth app you'll install is the actual production app. It will bond with you through behavioral patterns and PIN, then continuously collect real trust metrics throughout your demo session.

The OIDC Client (Simulated)

The demo application represents any OIDC-enabled app (O365, Salesforce, custom apps, AI agents). In production, this would be your actual application—the framework works identically.

The Backend (Real)

Our OIDC provider orchestrates authentication, the PDP analyzes metrics in real-time, trust scores are calculated continuously, and policy enforcement happens instantly—all production components.

The Framework (Complete)

You're experiencing the full integrated framework: OIDC Client → OIDC Provider ↔ Auth Device ↔ PDP. Every piece working together with correlation IDs linking all activity.

Key Takeaways - What to Watch For

1. Authentication Ceremony

Our OIDC provider will orchestrate your authentication. You'll choose between:

  • Passkey (FIDO2): Industry-standard, backed by Apple/Google/Microsoft/FIDO Alliance
  • Auth: Our app providing FIDO2 + behavioral identity proofs

Key Insight: Regardless of which you choose, Auth app monitors continuously in the background. Authentication ≠ Monitoring.

2. Trust Scores Update in Real-Time

Once authenticated, watch the demo client display four trust scores that update continuously:

Identity Trust

Validates you based on behavioral patterns learned during Auth app setup

Proximity Trust

Confirms your phone (running Auth) is physically near you via Bluetooth

Location Trust

Monitors for unexpected location changes or impossible travel

Device Health Trust

Tracks phone integrity: jailbreaks, hijacks, crashes, restarts

Key Insight: These aren't static checks at login—they update every few seconds throughout your entire session.

3. Trigger an Exception - See Enforcement

Try this during your demo: Turn OFF Bluetooth on your phone.

What happens:

  • Proximity Trust Score immediately fails (Auth can't verify your phone is near you)
  • PDP detects the violation and makes an enforcement decision
  • OIDC provider receives the decision and enforces policy
  • You'll see step-up authentication required to continue your session

Key Insight: This happens in seconds, not minutes or hours. Real-time continuous authentication enforcement.

4. Session Lifecycle Awareness

Notice how CA monitoring:

  • Begins: Just before authentication (OIDC provider initiates the ceremony)
  • Continues: Throughout your entire session with continuous metrics streaming
  • Ends: When you logout (OIDC provider signals session end)

Key Insight: Because the OIDC provider orchestrates auth AND manages sessions, there are no gaps. CA knows exactly when to start and stop.

5. Correlation IDs Link Everything

Behind the scenes, every event is linked by a correlation ID:

  • Your authentication event
  • Every metric uploaded by Auth app
  • Every PDP decision
  • Every enforcement action

Key Insight: Complete audit trail for compliance. No wondering "what happened and when?"

Before You Start: Install the Auth App

5-minute setup on your smartphone

Prerequisites Checklist

  • ✓ iOS or Android smartphone
  • ✓ 10 minutes of time (5 min setup + 5 min demo)
  • ✓ Bluetooth enabled on your phone
  • ✓ Auth app installed (instructions below)

Install Auth App Now

Why You Need Auth:

Auth is the continuous monitoring foundation. Even if you authenticate with Passkey in the demo, Auth must be installed to collect behavioral, location, proximity, and device health metrics throughout your session.

Installation Steps:

  1. Download the app for your platform:
  2. Install the app (standard app store installation)
  3. Open the app and complete setup:
    • Create your account
    • Set your PIN (this bonds Auth to you)
    • Grant permissions when prompted (Bluetooth, Location)
    • Complete the behavioral bonding wizard (follows your interaction patterns)
  4. Keep the app running in the background during the demo

Time Required: About 5 minutes total

Ready to Experience Continuous Authentication?

Launch the interactive demo and see the framework in action

Demo Duration: ~10 minutes

You'll authenticate, watch trust scores update live, trigger an exception, and see real-time policy enforcement.

Make sure you've installed the Auth app before clicking above

After the Demo

Next Steps Based on Your Role

For MSPs & SMBs

Ready to deploy this to your clients?

  • See the complete MSP solution with flexible pricing
  • Schedule a guided WebEx demo with policy configuration
  • Discuss deployment and partnership opportunities

For Platform Providers

Want to integrate this framework into your platform?

  • Learn about licensing the complete CA framework
  • Review technical integration architecture
  • Discuss white-label and on-premises options

Have Questions?

Our team is here to help answer questions about continuous authentication, deployment, or integration.