Two-Factor Solutions Choosing the Right One"

Size: px
Start display at page:

Download "Two-Factor Solutions Choosing the Right One""

Transcription

1 Copyright (c) 2013 RCDevs S.A. ( - Page 1/ Two-Factor Solutions Choosing the Right One By RCDevs ( The need to secure access to online applications and resources is increasing every day. This is the result of the business evolution where companies tend to have their staff work from remote locations, use mobile devices and deploy their corporate or external services on the cloud. In this context, it is important that employees, customers and collaborators get strongly identified and authenticated when accessing sensitive systems and data. There are many ways to increase the security level for external access systems but we will focus on the user authentication and in particular on the Two-Factor technologies (2FA) using One-Time Passwords (OTP). This article will not discuss the pros and cons of available solutions nor the costs involved in the deployment of such solutions. In fact, there are many resources on the Web discussing these topics already. Instead, we will focus on the OTP technology itself and see what are the criteria ensuring an OTP technology is really secure in its different contexts of application. This is an important point because many companies choose a technology based on a simple cost estimation and few general criteria. Moreover choosing a security solution is not an easy task as there are many solution providers on the market. These solutions are all promising to be the best one and come with more and more extra features. But in practice, not all of them provide the same level of security; as an example, many solutions propose a bunch of features and token devices to convince you, but this does not means the proposed features are the best choice when considered individually. If you plan to implement two-factor security, there are important points to be checked. But not everyone is a security specialist able to evaluate by himself the technological aspects. And as you certainly know, enterprise security is one of the particular domains where you cannot simply compare the commercial catalogs for common functionalities and requirements. This article will also provide you some technology explanations and the minimal knowledge required for choosing the right solution. 1. What is Two-Factor and OTP? Two-Factor means a certain security level in the authentication process where the end-users log in with credentials being the combination of something they know (typically a username and password) and something they have (typically an OTP token). The security of the user access is guarantied by the fact that without one of these two information, the users cannot login.

2 Copyright (c) 2013 RCDevs S.A. ( - Page 2/ The One-Time Password is a simple concept which provides the something that you have part of the authentication process. It is a password which changes at every usage or is valid for a very short time. The OTP is also not something you can know in advance but something that is provided by an additional hardware or software which you carry with you for logging in. The OTP mechanism is not something new and has been already used for decades. The most popular technology is the RSA SecureID. Today there exist many hardware vendors which provide OTP tokens. And with the Initiative for Open Authentication (OATH), all vendors tend to implement the OATH open algorithms for more hardware and software interoperability. An OATH token deliver an OTP code automatically (every n seconds) or on demand by pressing a button. The OATH supports three token families: The event-based tokens (HOTP), the time-based tokens (TOTP) and the challenge-based tokens (OCRA). Some vendors provide alternative token solutions such as Yubico with the YubiKey. The YubiKey does not display an OTP on a LCD screen. Instead, it is an USB stick which injects the OTP code directly to the password input when it plugged-in and pressed. Another way to deliver an OTP to the user is to use an out-of-band mechanism such as sending the OTP to the user mobile via SMS or sending the OTP via . There are also some derived solutions which rely on the OTP mechanisms but propose another user experience. An example is the QR Code login provided by TiQR or Google. 2. Why is OTP well suited for 2FA? At the time of this writing, people should implement strong authentication for any external or exposed system. In the domain of user authentication, OTP is not the only technology to be considered and there exist alternatives such as PKI with client certificates or even biometry. But OTP remains the most interoperable choice for standard requirements. It is also the simplest and most cost-effective way to implement strong authentication. And if you need to secure several heterogenous systems, OTP is most of the time guarantied to work with your systems at minimal integration costs. OTP is more interoperable for a very simple reason: From the point of view of the authenticating system, the OTP remains a password. And most existing systems requiring a user login still work with usernames and passwords. This is applicable to VPNs, Web applications and any standardized protocol such as SSH, FTP, SMTP, POP, IMAP, etc... Some people might say OTPs are outdated and today s authentication systems should implement newer technologies (mobile PUSH, electronic signatures, etc...). This is a good approach but it is simply not applicable to most of the systems and protocols in use in the real world. A practical example is the VPN servers where the common protocol used to implement remote user authentication is RADIUS. RADIUS can only transports classic credentials and also needs usernames and passwords. PKI-based authentication is very powerful in the sense that is relies on the strongest mechanism which is the electronic signature with public and private keys. But its usage is limited to some specific applications because the technology requires hardware or software directly connected to the user computers. This is required because unlike the OTP which is a code composed of few digits, the electronic signature is a much longer data which cannot be handled manually. It

3 Copyright (c) 2013 RCDevs S.A. ( - Page 3/ is well suited for banking access from home computers but not for accessing the company systems from your tablet PC. Biometry is very interesting because it provides a convenient way to get the user identity. Yet biometric systems do not replace passwords; your biometric identity (i.e. your fingerprint or facial recognition) is basically a static data which is comparable to the username part of your login credentials. Also a efficient and secure way of authenticating users with biometry is to get the user identity via a facial recognition and require an OTP. 3. Technical evaluation of an OTP solution Now that we presented the OTP concept, let s discuss some important points to be foreseen when evaluating and choosing an OTP technology. Depending on the level of security required, the authentication methods to be implemented, the following aspects should be reviewed carefully Secure server storage Any synchronous OTP authentication system like tokens and YubiKey work nearly the same way: the token device or software token application includes a shared secret key (the token seed) and a dynamic state (the event counter or the current timestamp). The OTP code is calculated based on a mathematical function using these metadata. To be able to validate an OTP, the authentication server must also store a copy of the secret key and the state value for each user and token. A particular attention should be given to the storage of these metadata on the OTP server. OTP systems generally stores the token metadata in an SQL or LDAP database. In any cases, the metadata must be stored in an encrypted form and in such a way that even if someone can access and read the SQL or LDAP data, there is no way to extract the original metadata from it. The server must also enforce a robust secure data protection, implemented through strong encryption cyphers to handle user metadata encryption/decryption. Alternatively, it may rely on an Hardware Security Module (HSM). This is the strongest but most expensive option Combined PIN and OTP passwords An OTP authentication system should provides the user authentication with OTP and also with combined PIN+OTP; the PIN being a static password such as your Active Directory password. Relying on a username and an OTP password is stronger than using static passwords because the OTP password changes for every login. But on the other side, the OTP password is generally shorter and only composed of digits (typically 6-8 digits with OATH). Without a proper user blocking protection, we can also consider an OTP password is more sensitive to bruteforce attacks than a static password with a good password policy. For example, with OATH HOTP and an HOTP look-ahead window set to 10 OTPs, each individual login attempt has 10/ = 1/ chances to succeed. Requiring both the static password (PIN) and the OTP as part of the authentication process increases a lot your security level. For example, even with a short PIN of 4 character and an OTP of 6 digits, the changes of finding a good combination would be 1/ Yet, this is true at the condition that the system checks both passwords but never tells what

4 Copyright (c) 2013 RCDevs S.A. ( - Page 4/ password is wrong. Let s take as example an SMS OTP system which first asks for your static PIN and then prompts for the SMS OTP. A typical Web login form will asks for the username and password (i.e. the PIN). The user enters the information, receives an SMS OTP and is prompted for the OTP with an on-screen challenge message (ex. Please enter your OTP: ). The PIN password has two advantages in this scenario: 1) no SMS will be sent if the PIN was wrong. This protects the user from SMS spamming and unexpected SMS costs when someone else tries to login. And 2) both passwords are required which greatly increases the strength of the login process. But in practice the strength of the combined passwords is not the same if the systems fails immediately after a wrong PIN is entered or if it behaves the same way after good/wrong PIN, then prompts the OTP and fails at the end without telling whether the PIN was wrong or the OTP was wrong. Of course in the later case, the system will not send the SMS if the PIN was wrong. It will just behave the same way with the good/wrong PINs and fail at the end of the authentication process not to let the attacker know what password was wrong. This principle applies to any OTP system working with PINs and challenged mode (in two steps). It is due to the fact that if one manages to hack the static PIN, the security is then diminished to the protection of the OTP alone. Systems where the PIN and OTP are provided at the same time are also not affected. For example, many systems support concatenated passwords where the user enters both PIN and OTP passwords in the same input field. Also systems which first check the OTP and then the PIN are not affected. Another interesting protection is to prepend the OTP codes with a static PIN code. Unlike the user password PIN described previously this prefix code is part of the OTP and not a secondary authentication factor. For extreme security, prepending the OTP with a PIN code can be used commonly with the static password. With the SMS authentication of our previous example, two modes might be supported: ondemand and prefetch OTP delivery. With on-demand, the SMS OTP is send immediately after the username and PIN are provided. And with prefetch mode, the next SMS is sent after an authentication is completed. With on-demand SMS, a challenge mechanism is always required and using concatenated passwords is not possible. Anyway, in both modes, challenged OTP is generally preferred and is more user friendly than combined passwords Authentication transaction locking A strong OTP system should prevent two authentication transactions to be started simultaneously for the same user. Or at least the OTP verification step and token state update in the token store must be handled under a locking system preventing concurrent operations. More generally, a valid OTP must not be re-usable whether it is an event-based OTP, a time-based OTP or any other. Without such an internal locking system, an OTP may be used twice (in two authentication process started concurrently for the same user). When challenge is used, an authentication session is initiated on the system and a challenge response is returned to the authenticating system (with a user prompt message). The user has to provide the requested information (i.e. the OTP) within the time limit of the challenge session. But what happens when the user starts a second authentication session or closes the first one by mistake (without responding the challenge) and starts another one. Some systems will

5 Copyright (c) 2013 RCDevs S.A. ( - Page 5/ prevent the user from starting the second session while the first one is still opened whereas other systems will create a second session overriding the first one. This second option is better from the point of view of the user which never has to wait 1-2 minutes for the challenge session timeout in such situations. Yet, this convenience is at the expense of security: Let s take as an example, a user (Alex) authenticating with a username and an event-based token in challenge mode. Alex enters his username and password and receives a challenge asking for his OTP. Now lets imagine user Bob is behind Alex and has seen the username and OTP or is able to capture the OTP from the network. Bob starts an authentication just after Alex, using Alex username and enters the challenge response (the OTP) before Alex. The OTP being an event-based code, it is valid for both Alex and Bob and without a proper protection, the first to provide the OTP or the last started session will succeed. Preventing the second session (for user Bob) to be started when Alex session is started also provide the advantage that Alex OTP cannot be used by Bob while Alex is authenticating even if the login credentials have been captured from the network. If the OTP is good, then it not usable anymore after Alex authentication ended. And if it s wrong, then it s useless for Bob. When a cluster of authentication servers is deployed, the transaction locking mechanism should be implemented at the cluster level and not only at the server level. We will discuss it a bit later Blocking policies The user blocking policy is an important point to be considered with authentication systems. The OTP mechanism provides the credential-level strength and the blocking policy determines how the system will be resistant to brut-force attacks. Let s take as an example a system protected with an OTP (without PIN). Without additional protection, the attacker has for example 1/ chances to find a good OTP per login request. The blocking policy will block the login attempts after n failed logins either permanently or for a configured period, preventing many retries. A complementary protection to the user blocking is to include a short blocking timer after each failed login to reject requests for the same user without processing them. This other protection will implement a minimum retry delay and may also protect the system from DOS attacks Multiple tokens per-user This is a common requirement to be able to assign and enable several tokens for a single user. For example, the user may have a home token and an office token. Or the user may have an hardware token and a mobile software token. This is a powerful functionality but it must be used carefully. The main reason is that the more you enable concurrent tokens, the more you decrease the security of OTP codes. Let s imagine up to 10 OATH HOTP tokens are enabled for a user. Now let s say the HOTP tokens have a look-ahead window of 10 OTPs and an OTP length of 6 digits. Each token may also accept 10 codes at a time making a total of 100 valid codes per user at a time. The chances of finding a good OTP is 100/ so 1/ As you can see in our example, each additional token reduces by a factor of 10 the security of the OTP system and the OTP strength is not acceptable anymore. The same principle applies to time-base tokens. For example, you use OATH TOTP tokens and you accept a clock drift of max 2.5 mins forward and backward between the server and the

6 Copyright (c) 2013 RCDevs S.A. ( - Page 6/ Token. With 10 valid tokens, the chances of finding a good OTP is also 100/ so 1/ Now if your HOTP token are configured with a look-ahead window of 20 OTPs or your TOTP tokens allow a clock drift of 5 mins, this chances of finding a good OTP goes as high as 1/ A system implementing multiple concurrent tokens must prevent users from enabling many tokens at a time. A good balance between security and flexibility is to allow a maximum of 2 or 3 concurrent tokens for a user. If more tokens per user are required, concurrent tokens is not the solution. A workable solution is to asks the user which of his tokens he want to use as part of the authentication process. For example, the has to enter the OTP in the form <TokenID>:<OTP> and the system will validate the OTP for specified token only. Another reason why enabling multiple tokens reduces security is simply because the more the users have tokens in their hands, the less they will take care of each of them individually. If a user looses or is stollen one of his tokens, there are chances he will not even notice it or too late. And if he does, he will not prioritize the blocking/renewal of this specific token because he is still able to authenticate with the remaining ones. When an additional token is required for backup (non business blocking) purposes, a good approach is to have a primary token and a secondary unactivated token. In case the user cannot use his primary token, he may contact the help-desk or use a self-service portal to temporarily activate the secondary token instead of the primary one. Or you may temporarily configure the user authentication with another method like SMS OTP Software tokens vs hardware tokens vs SMS OTP authentication systems generally propose hardware tokens, software tokens and out-ofbad authentication. It is generally considered that: - Hardware tokens provides the best protection at the expense or additional cost and more maintenance. - Software tokens are more convenient but less secure than hardware tokens because they rely on the mobile phone OS and storage. - Out-of-band SMS is less reliable because it uses the mobile operator services. It offers a good level of security as the channel used for authenticating and the channel used for transmitting the OTP are different. Hardware tokens are always preferred for highly secured systems because the sensitive token metadata (i.e. The secret seed and token state) is not extractible from the hardware. The software tokens store these information in the application datastore on the phone. The seed protection also depends on the security level provided by the OS for storing these data. Yet, some other factors must be considered: - Soft tokens can be protected with a PIN code whereas hardware tokens have no keypad and display the OTP by pressing a button.

7 Copyright (c) 2013 RCDevs S.A. ( - Page 7/ - Usual software token applications are able to register multiple independent token instances whereas a hardware token is generally bound to one service provider. - Users will most of the time notice they lost or were stolen their mobile phone after minutes whereas they will realize they lost their token only the next time they will need to use it. Provisioning and maintaining large amounts of hardware tokens may also introduces big overheads and non-negligible extra costs. Software tokens have the advantage that you do not need to deliver nor exchange any hardware for the users. And many OTP solution vendors provide some self-service applications for software token enrollment and resynchronization. Out-of-band authentication is becoming more and more popular because it can use a device the users already have (their mobile phone) and it does not require any specific enrollment process. The initial deployment of an SMS-based solution is also very simple compared to tokens. Yet, relying on services of mobile operators with SMS roaming and SMS delivery delays is by far not as reliable as a token-based solution. And in most scenarios, companies will require a dual authentication system with SMS and software token as fallback. An efficient authentication solution will provide this backup functionality and will accept both the SMS OTP and the token OTP at the same time. If the user has no mobile coverage of does not receive the SMS OTP immediately, he can still use his mobile token. The security of SMS OTP comes from the fact that the OTP is sent via another communication channel than the one used for login in. An attacker would also have to hack both the GSM and computer network channels used by the user at the same time. Yet, it must be considered that mobile phones and their SMS store have never been made for storing sensitive data. For example most smartphones rely on a cleartext sqlite database to store the SMS messages. The OTP received on the mobile is also not stored securely and this is particularly important when authentication systems use the prefetched OTPs. In this case, the next OTP is received after the last login and until the next authentication which can be in 10 days Clustering considerations Clustering and especially failover is a an important aspect when dealing with central infrastructure components such as authentication systems. If many access to your company resources rely on the OTP, then you must setup your authentication infrastructure with a minimum level of redundancy. Most OTP systems work with an SQL database and/or an LDAP directory as back-end and can be deployed in cluster mode where every server is connected to same DB and LDAP. But not all of these systems are able to ensure cluster consistency at the transaction and session level. By consistency we means the distribution and the locking of user transactions and sessions across all the cluster nodes. This point is mitigated when the cluster nodes are never used concurrently but it becomes mandatory in the following scenarios: - More than one authentication server are used concurrently in some circumstances. - Authentication request are distributed randomly to the servers (load-balanced cluster).

8 Copyright (c) 2013 RCDevs S.A. ( - Page 8/ - Multiple servers are deployed which use the same user and token store(s) (DB/LDAP). For example you have several sites, each site using its local server(s) but using the same users with the same DB/LDAP stores. In these scenarios and without a proper cluster support implementing distributed transaction locks and shared sessions, the OTP system may be subject to replay attacks and user data inconsistencies. To illustrate the replay attack, let s say user Alex logs in on company Site A with his event-based token. And at the same time, he logs in on company Site B with the same OTP. The OTP code will be successfully validated on both sides but it should have worked only once. The same principle is applicable to the distribution of any work data across the OTP cluster, including challenge sessions, user blocking states, etc Replay attacks A typical attack affecting OTP authentication systems is the replay attack where it becomes possible to re-use the same OTP code two or more times. An OTP system must also be resistant to OTP replay. Let s go through the replay issues for the different OTP mechanisms. Event-based tokens (ex. OATH HOTP and YubiKey) An event-based tokens generates a new code on-demand. It must also permanently stores a token state or event counter. On the OTP server, the token code validation and the counter increment must be performed under a transaction lock to ensure the same OTP cannot the used in two simultaneous logins. Time-based tokens (ex. OATH TOTP) A time-based token does not need to store a state value as in this case the state is the current timestamp. Yet, one OTP code is valid for an amount of time (ex. 30 seconds) and if you allow some clock drift, this timeframe is several minutes. In order to prevent OTP replays, it must not possible to re-use the OTP within this timeframe. The OTP server must also store the timestamp of the last OTP to prevent any code generated up to this time to be validated twice. Moreover, like with the event-based tokens the server must validate the OTP and store the last timestamp under a transaction lock to ensure the same OTP cannot the used in two simultaneous logins. Challenge-based tokens (ex. OATH OCRA) With challenge-based tokens, the generated OTP depends on a random challenge code which is provided by the server at each new login. As the random challenge is specific to one authentication session, these tokens are also not affected by the replay issues of HOTP and TOTP. Yet the server challenge may be insufficient in terms of randomness and using an additional moving factor (i.e. a timestamp, an event counter or a session ID) should be used in the OTP calculation. Without this additional factor, the same challenge would always produce the same OTP. This problem becomes critical when the challenge length is for example four digits. In this case and without the second moving factor, the token is only able to issue different OTPs.

9 Copyright (c) 2013 RCDevs S.A. ( - Page 9/ 3.9. Connected tokens Some solutions propose alternative authentication systems which use the mobile phone capabilities (data network connectivity, mobile push or even camera) to transport authentication data. These data channels may be used 1) to transport the authentication requests to the mobile token and/or 2) to transport the authentication responses (OTP or electronic signature) to the OTP server. There are several solutions to transport an authentication requests to the mobile tokens: - Server connection : The mobile token opens a permanent connection the OTP server on its public IP address. - Mobile Push : The OTP server sends a push notification to the mobile token. This requires an IP connection too. - NFC communication : The mobile token receives the OTP request wirelessly via a near-field communication. - QR Codes : The mobile tokens is able to scan the authentication request displayed via a QR Code on the computer screen. And there are not many ways to transport the authentication responses to the OTP server: The mobile token has to contact the OTP server on its network address over Wifi or 3G. Sending authentication requests over the IP network or via the mobile push API both transport data over the IP network. With server connection, the mobile token must pre-establish a permanent connection with the OTP server in order to be contacted later. Whereas with push, the mobile just needs to be connected to the network to be able to receive push notifications. Note that none of these systems work when the mobile phone has no network coverage. QR Code authentication do not use the network communication channels. Instead, the mobile tokens reads the authentication request on the computer screen. This also much more reliable than IP and push communications. Then comes the problem of returning the authentication responses (OTP or electronic signature) to the OTP server. At first look, an electronic signature seems to be a better choice because it offers a stronger authentication than an OTP. Yet an RSA/ECC signature is much longer then an OTP (ex. 1024/2048 bits for RSA) and if the token has no network coverage, there is no other way to return this very long data manually to the server. With an OTP (ex: an OATH OCRA response), the token may optionally display the 6-8 digits OTP code for a manual authentication if it was not able to automatically send the response via the network. In this context of availability we can also consider an OTP is more reliable than an electronic signature. Some vendors propose a push-based authentication where the login request is displayed on the mobile token. The user optionally enters a PIN and clicks a button to confirm the access. It is

10 Copyright (c) 2013 RCDevs S.A. ( - Page 10/ very convenient but requires the mobile network connectivity, and because of restrictions with push APIs, it uses un-guarantied cloud-based push services for Android, IOS, etc... Some other vendors propose QRCode authentication with OATH challenge-based OTP. The OTP is returned via the IP network or manually when there is no network coverage. This alternative remains very handy for the user, fully secure and is still workable even with no network connectivity. We ve just discussed the pros and cons of connected tokens at the communication level. But another important point has to be discussed which affect the security of the authentication process: As a general rule, a connected token should never work without a manual or scanned user input and in particular without a session context data exchange between the user computer and the token. Because without it, there is no insurance the computer login session is linked to the token request. Let s take an example: User Alex logs in a web page and enters his username. At the same moment, user Bob who is at the office behind and has seen Alex is connecting, goes to the login page, enters Alex s usename and clicks the login button just before Alex. Alex receives a push-based authentication request on his mobile token. The request informations are correct and Alex confirms the access. Here Alex has confirmed Bob s authentication session. Bob gets authenticated using Alex account and Alex is not authenticated. To avoid this situation, the login page should display an ID to be entered on the mobile token or the token should display an ID to be entered on the login page. This ID would ensure the token login request corresponds to the computer login session. Of course, the login page and the token may display an ID to be verified by the user during login. But in practice, the user will not always verify the ID matches and will not even understand the meaning if it. A manual input of a short ID as also required to secure the authentication process. QR login is not affected by this problem because the ID is passed from the login page to the token via the QR code itself. There is also no need for another manual input Cloud service or integrated software Cloud-based services gain in popularity as many security vendors tend to provide the authentication facilities via remotely hosted services. This is very attractive for customers who see here a way to abstract the complexity of the authentication systems and reduce their solution and deployment costs. Yet, there are some aspects which need to be analysed in order to choose between a corporate or a cloud solution: - The authentication data whig are transported from your company to the external services go across many public (untrusted) networks and you can never know nor control what is in the middle. Communications may be secured with SSL two-way but even then, you don t know at what level the SSL endpoint stops on the remote side and what other networks and systems are left behind. With a local implementation, you alway have the full control over your infrastructure. - An authentication service may require to be connected to your corporate LDAP and access or replicate the user information. Do you want and are you allowed to send these sensitive/ personal data to a service provider especially when it is located in another country?

11 Copyright (c) 2013 RCDevs S.A. ( - Page 11/ - An authentication service is used by many companies other than yours and the APIs are generally publicly accessible on the Internet. These online services make good candidates for hackers and the service you rely on may be under attack simply because someone else is targeted. Online services might be more sensitive to DOS attacks too. - Access systems and in particular user authentication is a central and critical point of your corporate security. If you externalize the authentication, you must be 100% sure you can trust the infrastructure, operations and staff behind the cloud services. You define and enforce some security procedures and policies for your own security administrators and staff. You also have to verify that the same level of procedures and staff clearance is enforced for your externalized services. - The authentication systems are critical because they may be blocking or impacting your business in case of unavailability. The cloud services must also be implemented in such a way that it is as reliable as your internal services. Externalized systems mean new potential points of failure. What happens if the remote service is unavailable due to network problems? - Externalizing the authentication looks interesting to optimizing the costs and maintenance. But after few years you may realize it costs even more than an efficient local implementation. Remote services require additional connectors, replications, connectivity and never means less integration efforts for connecting your VPNs and applications. Depending on your size, you may also need to deploy thousands of users to the remote systems, batch modify them etc... Cloud services will provide Web-based remote interfaces with import tools etc... But will you be able to run custom tools and scripts? Can you prototype, test, duplicate, backup like in your local environment. - The infrastructure costs impact for a local implementation is mitigated because most companies use virtualization. You can also virtualize the security infrastructure but of course your software maintenance will remain. Conclusion We went around few technical aspects of typical OTP solutions. We ve also seen that aside the basic functionalities, some technical criteria should be analysed as they have important an impact on the strength of your security implementation. Of course there are many other parameters to be considered in your process of choosing the right OTP solution. And the technical aspect is just a part of it. But the intend of this short article is only to provide you with a technical overview or some deeper knowledge around the underlying technologies. We also hope these information will help you approach two-factor security concerns with the real questions and a more critical viewpoint. You can contact RCDevs at info@rcdevs.com if you need further information.

12 Copyright (c) 2013 RCDevs S.A. ( - Page / About RCDevs This article has been written by RCDevs S.A. ( RCDevs is an award winning security company specialized in next-generation two-factor authentication. RCDevs is building its growing reputation over high-quality security software and its customers entire satisfaction. RCDevs provides cutting-edge enterprise-grade solutions in more that 30 countries to customers ranging from SMEs to large corporations in the IT, financial, healthcare and government sectors. RCDevs is the developer of OpenOTP Authentication Server ( openotp/) and TiQR QRCode Authentication Server ( RCDevs OpenOTP and TiQR Authentication Server received the Highly Commended Award for the Best SME Security Solution at SC Magazine Awards 20 Europe and won the Sesames Innovation Awards 20.

NetIQ Advanced Authentication Framework

NetIQ Advanced Authentication Framework NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

A brief on Two-Factor Authentication

A brief on Two-Factor Authentication Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Remote Access Securing Your Employees Out of the Office

Remote Access Securing Your Employees Out of the Office Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc.

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc. Implementing two-factor authentication: Google s experiences Cem Paya (cemp@google.com) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal

More information

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale

More information

The Cloud, Mobile and BYOD Security Opportunity with SurePassID

The Cloud, Mobile and BYOD Security Opportunity with SurePassID The Cloud, Mobile and BYOD Security Opportunity with SurePassID Presentation for MSPs and MSSPs January 2014 SurePassID At A Glance Founded 2009 Headquartered in Orlando, FL 6 sales offices in North America,

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

Security Provider Integration RADIUS Server

Security Provider Integration RADIUS Server Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

RemotelyAnywhere. Security Considerations

RemotelyAnywhere. Security Considerations RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP

More information

2 factor + 2. Authentication. way

2 factor + 2. Authentication. way 2 factor + 2 way Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Balancing risk, cost and user experience with SMS for 2FA

Balancing risk, cost and user experience with SMS for 2FA Balancing risk, cost and user experience with SMS for 2FA MessageMedia Industry Intelligence Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email vs. SMS for

More information

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to

More information

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business Authentication Solutions Versatile And Innovative Authentication Solutions To Secure And Enable Your Business SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime

More information

Guide to Evaluating Multi-Factor Authentication Solutions

Guide to Evaluating Multi-Factor Authentication Solutions Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor

More information

iphone in Business How-To Setup Guide for Users

iphone in Business How-To Setup Guide for Users iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

ProtectID. for Financial Services

ProtectID. for Financial Services ProtectID for Financial Services StrikeForce Technologies, Inc. 1090 King Georges Post Road #108 Edison, NJ 08837, USA http://www.strikeforcetech.com Tel: 732 661-9641 Fax: 732 661-9647 Introduction 2

More information

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

DIGIPASS Authentication for Sonicwall Aventail SSL VPN DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties

More information

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015 Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction

More information

NetIQ Advanced Authentication Framework - Smartphone Applications

NetIQ Advanced Authentication Framework - Smartphone Applications NetIQ Advanced Authentication Framework - Smartphone Applications User Guide Version 3.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Install Smartphone

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA SecurID Software Token 1.0 for Android Administrator s Guide RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION

TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION TECHNOLOGY LEADER IN GLOBAL REAL-TIME TWO-FACTOR AUTHENTICATION SMS PASSCODE is the leading technology in a new generation of two-factor authentication systems protecting against the modern Internet threats.

More information

How Secure is your Authentication Technology?

How Secure is your Authentication Technology? How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any

More information

2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY. Axel Hoffmann

2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY. Axel Hoffmann 2-FACTOR AUTHENTICATION WITH OPENLDAP, OATH-HOTP AND YUBIKEY Axel Hoffmann Biography Axel Hoffmann Linux System Administrator 1&1 Mail & Media Dev. & Tech. GmbH axel.hoffmann@1und1.de 2 Introduction Requirements

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

YubiRADIUS Deployment Guide for corporate remote access. How to Guide YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship

More information

Multi-Factor Network Authentication

Multi-Factor Network Authentication Multi-Factor Network Authentication Setup Guide Multi-Factor Network Authentication (also called GhostPorts) is a powerful security feature available with the Halo Workload Firewall Management security

More information

Infra-estruturas e dispositivos para a protecção integral segura de dados na Nuvem. Manuel Eduardo Correia CRACS/INESC TEC DCC/FCUP

Infra-estruturas e dispositivos para a protecção integral segura de dados na Nuvem. Manuel Eduardo Correia CRACS/INESC TEC DCC/FCUP Infra-estruturas e dispositivos para a protecção integral segura de dados na Nuvem Manuel Eduardo Correia CRACS/INESC TEC DCC/FCUP Virtualization Risks How secure is my data in a virtualized world? APP

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

White Paper. The Principles of Tokenless Two-Factor Authentication

White Paper. The Principles of Tokenless Two-Factor Authentication White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Passwordstate Mobile Client Manual. 2016 Click Studios (SA) Pty Ltd

Passwordstate Mobile Client Manual. 2016 Click Studios (SA) Pty Ltd 2 Table of Contents Foreword 0 Part I Introduction 3 Part II User Preferences 3 Part III System Settings 4 Part IV Mobile Client Permissions 6 Part V Mobile Client Usage 8 Introduction 1 3 Introduction

More information

Internet Banking Two-Factor Authentication using Smartphones

Internet Banking Two-Factor Authentication using Smartphones Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania

More information

Facebook s Security Philosophy, and how Duo helps.

Facebook s Security Philosophy, and how Duo helps. Facebook s Security Philosophy, and how Duo helps. How Duo Factors in to Facebook s Information Security Philosophy The Challenge: Facebook manages personal data for 1.19 billion active users 1 across

More information

MIGRATION GUIDE. Authentication Server

MIGRATION GUIDE. Authentication Server MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

YubiKey Authentication Module Design Guideline

YubiKey Authentication Module Design Guideline YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company

More information

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

Device LinkUP + Desktop LP Guide RDP

Device LinkUP + Desktop LP Guide RDP Device LinkUP + Desktop LP Guide RDP Version 2.1 January 2016 Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

White Paper. The risks of authenticating with digital certificates exposed

White Paper. The risks of authenticating with digital certificates exposed White Paper The risks of authenticating with digital certificates exposed Table of contents Introduction... 2 What is remote access?... 2 Authentication with client side digital certificates... 2 Asymmetric

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Lync SHIELD Product Suite

Lync SHIELD Product Suite Lync SHIELD Product Suite The Natural Solution For Securing Lync Connectivity For today s mobile enterprise, the need to connect smartphones to the corporate network has become a vital business requirement.

More information

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Authentication. Authentication in FortiOS. Single Sign-On (SSO) Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication

More information

DIGIPASS Authentication for Check Point Security Gateways

DIGIPASS Authentication for Check Point Security Gateways DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Swivel Multi-factor Authentication

Swivel Multi-factor Authentication Swivel Multi-factor Authentication White Paper Abstract Swivel is a flexible authentication solution that offers a wide range of authentication models. The use of the Swivel patented one-time code extraction

More information

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1

More information

Authentication Solutions Buyer's Guide

Authentication Solutions Buyer's Guide WHITE PAPER: AUTHENTICATION SOLUTIONS BUYER'S GUIDE........................................ Authentication Solutions Buyer's Guide Who should read this paper Individuals who would like more details regarding

More information

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1

More information

Why SMS for 2FA? MessageMedia Industry Intelligence

Why SMS for 2FA? MessageMedia Industry Intelligence Why SMS for 2FA? MessageMedia Industry Intelligence MessageMedia Industry Intelligence Why SMS for 2FA? ii Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,

More information

Secure Authentication Managed Service Portfolio

Secure Authentication Managed Service Portfolio Secure Authentication Managed Service Portfolio Combating Corporate Identity Theft Signify Managed Authentication Services Signify offers a complete range of Secure Authentication and Identity Management

More information

Using GhostPorts Multi-Factor Authentication

Using GhostPorts Multi-Factor Authentication Using GhostPorts Multi-Factor Authentication With CloudPassage Halo GhostPorts is a powerful multi-factor authentication feature available with the Halo NetSec and Halo Professional subscription plans.

More information

Cisco ASA Authentication QUICKStart Guide

Cisco ASA Authentication QUICKStart Guide Cisco ASA Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved.

More information

Strong Authentication for Secure VPN Access

Strong Authentication for Secure VPN Access Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations

More information

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0 Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of

More information

QUICK SELLING GUIDE THE FUTURE OF AUTHENTICATION

QUICK SELLING GUIDE THE FUTURE OF AUTHENTICATION QUICK SELLING GUIDE THE FUTURE OF AUTHENTICATION Who are SecurEnvoy? As the original inventors of tokenless authentication, our goal is to continue to design innovative solutions that take advantage of

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010

More information

etoken Single Sign-On 3.0

etoken Single Sign-On 3.0 etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to

More information

Two-Factor Authentication

Two-Factor Authentication WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

Multi Factor Authentication API

Multi Factor Authentication API GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...

More information

Two Factor Authentication - USER GUIDE

Two Factor Authentication - USER GUIDE Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview

More information

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS SafeNet Strong Authentication and Transaction Verification Solutions The Upward Spiral of Cybercrime

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication A Total Cost of Ownership Viewpoint CONTENTS + Two-Factor Authentication 3 A Total Cost of Ownership Viewpoint + Introduction 3 + Defining Total Cost of Ownership 3 + VeriSign

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation March 2016 Public Agenda SAP security portfolio Overview SAP Single Sign-On Single sign-on main scenarios Capabilities Summary 2016 SAP SE or an SAP affiliate

More information

YubiKey & OATH- TOTP Verification

YubiKey & OATH- TOTP Verification YubiKey & OATH- TOTP Verification February 7, 2014 YubiKey & OATH-TOTP Verification 2014 Yubico. All rights reserved. Page 1 of 11 Introduction Disclaimer Yubico is the leading provider of simple, open

More information

Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide

Replacing legacy twofactor. with YubiRADIUS for corporate remote access. How to Guide Replacing legacy twofactor authentication with YubiRADIUS for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection.

More information

Password Management Evaluation Guide for Businesses

Password Management Evaluation Guide for Businesses Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various

More information