01.27.2016 - Why You Need TOTP

Static Passwords Alone, Are A Thing of the Past. Gone are the days where a username and password alone are secure enough for an organizations sensitive data.Static passwords can easily be cracked or stolen, leaving your sensitive information vulnerable to hackers or unauthorized users. The worst part about that is you don’t even know that a password has been compromised until it’s too late. Vulnerabilities can even create headaches for managers as the weak authentication can leave users unaccountable for their actions. Another issue with static passwords is, let’s be honest, it’s hard to remember all the different passwords you have for all of the different accounts that you need to access. Forgotten passwords create not only a hassle for you, but also a lot of extra time wasted by your helpdesk or IT department that should be spent on more important issues. ...

01.18.2016 - Kerberos, The Three Headed Dog of Identity

Kerberos is another name for the three headed hound that guarded Hades in Greek mythology. Most of us in the US know the mythical beast by the name Cerebos. The mythological Kerberos was the offspring of Echidna and Typhon and was captured by Heracles as one of his twelve labors. ...

01.5.2016 - It’s So Meta (data)

One of the key enabling technologies in Federation is Metadata. In the early days of SAML (yes there was a SAML 1.0) one of the more difficult aspects of setting up a federation relationship was exchanging signing certificates and unique identifiers. This often involved emailing public certificates and URNs back and forth, and in some cases, multiple times. In SAML 2 the problem got even worse because in addition to the sign on endpoints from SAML 1.0, there were now sign off endpoints to consider as well as more bindings. ...

Tags

  • The database in which all of your organization’s sensitive identity data is stored.
  • A digital ledger in which digital transactions are recorded chronologically and publicly.
  • Securely managing customer identity and profile data, and controlling customer access to applications and services.
  • The means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.
  • A legal framework that sets guidelines for the collection and processing of personal information of individuals within the EU.
  • The policy-based centralized orchestration of user identity management and access control.
  • An authentication infrastructure that is built, hosted and managed by a third-party service provider.
  • A security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
  • A global provider of innovative and affordable identity access management solutions. 
  • Managing and auditing account and data access by privileged users.
  • Tools and technologies for controlling user access to critical information within an organization.
  • An authentication process that allows a user to access multiple applications with one set of login credentials.