MFA is the norm in business today due to the desire for better access control and the need to comply with regulatory requirements. And while every company and every vertical have different requirements for their MFA solutions, they all should start by analyzing the same three elements: scope, usability, and means of delivery. With these elements in mind, this paper takes a tactical approach to guide you through various MFA options.
Optimal IdM Named a Leader in KuppingerCole Leadership Compass Identity
As a Service: Single Sign-On to the Cloud Report
(40 minutes 50 seconds) Webinar: Bridging The Protocol Gap On Cloud Identity Projects (40 minutes 50 seconds) Bridging the divide between newer authorization and federation protocols such as OAuth2 and OpenID Connect and connecting to older federation protocols such as SAML2 and WS-Federation presents some unique challenges. We will discuss those challenges and look at some practical, real world solutions. Various web applications, thick clients, and web services will be reviewed. This technical presentation will cover: Origin of protocols and when to use them Best options to use with mobile apps How to deal with situations outside of specifications Security concerns to consider
(2 minutes 40 seconds)
The OptimalCloud Deployment Scenarios (2 minutes 40 seconds)
Discusses several deployment scenarios for The OptimalCloud.