Secu​​re implementation

​​​​Gemalto CAS has been designed and approved by both internal and external security audits. In addition, to provide the most advanced level of user identity protection, the software security module or an external hardware security module (HSM) is linked to an authentication server to store and use cryptographic keys. Using standard frameworks and protocols such as HTTP/HTTPS, authentication modules interact with existing data servers to maintain and update user authentication information. Multiple database options are supported.