Experience Continuous Authentication Live
See the complete Pulse CA framework in action. Real authentication, real metrics, real enforcement—in about 10 minutes.
What You'll Experience
✓ Real Components
- Auth app from app store (on your phone)
- Real OIDC authentication flow
- Live PDP analysis and trust scores
- Actual policy enforcement
⚙ Simulated for Demo
- OIDC client application (represents any app like O365, Salesforce, etc.)
- Sample policies (you'll configure your own in production)
📊 What You'll See
- Authentication ceremony (Passkey or Auth)
- Four trust scores updating in real-time
- Live policy enforcement when you trigger an exception
- Complete session lifecycle
How This Demo Works
Understanding what's real and what's simulated
Your Phone (Real)
The Auth app you'll install is the actual production app. It will bond with you through behavioral patterns and PIN, then continuously collect real trust metrics throughout your demo session.
The OIDC Client (Simulated)
The demo application represents any OIDC-enabled app (O365, Salesforce, custom apps, AI agents). In production, this would be your actual application—the framework works identically.
The Backend (Real)
Our OIDC provider orchestrates authentication, the PDP analyzes metrics in real-time, trust scores are calculated continuously, and policy enforcement happens instantly—all production components.
The Framework (Complete)
You're experiencing the full integrated framework: OIDC Client → OIDC Provider ↔ Auth Device ↔ PDP. Every piece working together with correlation IDs linking all activity.
Key Takeaways - What to Watch For
1. Authentication Ceremony
Our OIDC provider will orchestrate your authentication. You'll choose between:
- Passkey (FIDO2): Industry-standard, backed by Apple/Google/Microsoft/FIDO Alliance
- Auth: Our app providing FIDO2 + behavioral identity proofs
Key Insight: Regardless of which you choose, Auth app monitors continuously in the background. Authentication ≠ Monitoring.
2. Trust Scores Update in Real-Time
Once authenticated, watch the demo client display four trust scores that update continuously:
Identity Trust
Validates you based on behavioral patterns learned during Auth app setup
Proximity Trust
Confirms your phone (running Auth) is physically near you via Bluetooth
Location Trust
Monitors for unexpected location changes or impossible travel
Device Health Trust
Tracks phone integrity: jailbreaks, hijacks, crashes, restarts
Key Insight: These aren't static checks at login—they update every few seconds throughout your entire session.
3. Trigger an Exception - See Enforcement
Try this during your demo: Turn OFF Bluetooth on your phone.
What happens:
- Proximity Trust Score immediately fails (Auth can't verify your phone is near you)
- PDP detects the violation and makes an enforcement decision
- OIDC provider receives the decision and enforces policy
- You'll see step-up authentication required to continue your session
Key Insight: This happens in seconds, not minutes or hours. Real-time continuous authentication enforcement.
4. Session Lifecycle Awareness
Notice how CA monitoring:
- Begins: Just before authentication (OIDC provider initiates the ceremony)
- Continues: Throughout your entire session with continuous metrics streaming
- Ends: When you logout (OIDC provider signals session end)
Key Insight: Because the OIDC provider orchestrates auth AND manages sessions, there are no gaps. CA knows exactly when to start and stop.
5. Correlation IDs Link Everything
Behind the scenes, every event is linked by a correlation ID:
- Your authentication event
- Every metric uploaded by Auth app
- Every PDP decision
- Every enforcement action
Key Insight: Complete audit trail for compliance. No wondering "what happened and when?"
Before You Start: Install the Auth App
5-minute setup on your smartphone
Prerequisites Checklist
- ✓ iOS or Android smartphone
- ✓ 10 minutes of time (5 min setup + 5 min demo)
- ✓ Bluetooth enabled on your phone
- ✓ Auth app installed (instructions below)
Install Auth App Now
Why You Need Auth:
Auth is the continuous monitoring foundation. Even if you authenticate with Passkey in the demo, Auth must be installed to collect behavioral, location, proximity, and device health metrics throughout your session.
Installation Steps:
- Download the app for your platform:
- Install the app (standard app store installation)
- Open the app and complete setup:
- Create your account
- Set your PIN (this bonds Auth to you)
- Grant permissions when prompted (Bluetooth, Location)
- Complete the behavioral bonding wizard (follows your interaction patterns)
- Keep the app running in the background during the demo
Time Required: About 5 minutes total
Ready to Experience Continuous Authentication?
Launch the interactive demo and see the framework in action
Demo Duration: ~10 minutes
You'll authenticate, watch trust scores update live, trigger an exception, and see real-time policy enforcement.
Make sure you've installed the Auth app before clicking above
After the Demo
Next Steps Based on Your Role
For MSPs & SMBs
Ready to deploy this to your clients?
- See the complete MSP solution with flexible pricing
- Schedule a guided WebEx demo with policy configuration
- Discuss deployment and partnership opportunities
For Platform Providers
Want to integrate this framework into your platform?
- Learn about licensing the complete CA framework
- Review technical integration architecture
- Discuss white-label and on-premises options
Have Questions?
Our team is here to help answer questions about continuous authentication, deployment, or integration.