Securing corporate assets with two factor authentication

Similar documents
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

How to reduce the cost and complexity of two factor authentication

White Paper. The Principles of Tokenless Two-Factor Authentication

RSA SecurID Two-factor Authentication

Hard vs. Soft Tokens Making the Right Choice for Security

Why SMS for 2FA? MessageMedia Industry Intelligence

Guide to Evaluating Multi-Factor Authentication Solutions

Enhancing Organizational Security Through the Use of Virtual Smart Cards

EBA STRONG AUTHENTICATION REQUIREMENTS

Security Considerations for DirectAccess Deployments. Whitepaper

Remote Access Securing Your Employees Out of the Office

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

Moving Beyond User Names & Passwords Okta Inc. info@okta.com

Secure Web Access Solution

Moving Beyond User Names & Passwords

Multi-Factor Authentication

Strong Authentication for Secure VPN Access

RSA SecurID Software Token Security Best Practices Guide

VoiceTrust Whitepaper. Employee Password Reset for the Enterprise IT Helpdesk

RSA SECURITY SOLUTIONS. Secure Mobile & Remote Access

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Welcome Guide for MP-1 Token for Microsoft Windows

Two-Factor Authentication: Guide to FEXCO CFX SMS/APP Verification

Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Tranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have"

etoken Single Sign-On 3.0

Two-Factor Authentication Basics for Linux. Pat Barron Western PA Linux Users Group

SECUREAUTH IDP AND OFFICE 365

Two-Factor Authentication

PROTECT YOUR FINANCIAL TRANSACTIONS

Two-Factor Authentication

White Paper. The risks of authenticating with digital certificates exposed

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

PSN compliant remote access Whitepaper

The Convergence of IT Security and Physical Access Control

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

WHITE PAPER. Smart Card Authentication for J2EE Applications Using Vintela SSO for Java (VSJ)

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Proven. Trusted.

STRONGER AUTHENTICATION for CA SiteMinder

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Two-Factor Authentication and Swivel

ADDING STRONGER AUTHENTICATION for VPN Access Control

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Entrust IdentityGuard

Securing Virtual Desktop Infrastructures with Strong Authentication

HOTPin Integration Guide: DirectAccess

Authentication Solutions VERSATILE AND INNOVATIVE AUTHENTICATION SOLUTIONS TO SECURE AND ENABLE YOUR BUSINESS

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

Modern two-factor authentication: Easy. Affordable. Secure.

Online Cash Management Security: Beyond the User Login

Proposal Document TitleDocument Version 1.0 TitleDocument

Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks

Cybersecurity and Secure Authentication with SAP Single Sign-On

ADAPTIVE USER AUTHENTICATION

Adding Stronger Authentication to your Portal and Cloud Apps

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication

The Authentication Revolution: Phones Become the Leading Multi-Factor Authentication Device

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

A brief on Two-Factor Authentication

The Essential Security Checklist. for Enterprise Endpoint Backup

National Cyber Security Month 2015: Daily Security Awareness Tips

Ultra-strong authentication to protect network access and assets

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

Securing mobile devices in the business environment

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

The Convergence of IT Security and Physical Access Control

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

white paper 5 Steps to Secure Internet SSO Overview

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

QUICK SELLING GUIDE THE FUTURE OF AUTHENTICATION

Transcription:

WHITEPAPER Securing corporate assets with two factor authentication Published July 2012

Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for OTP delivery Contact information OTP generating mechanisms Integrating Two-factor authentication About Celestix HOTPin Introduction Organizations require users to enter their username and passwords in order to validate their identity. However, with the proliferation of applications, websites and services that require authentication, users are under increasing pressure to maintain their passwords and it has become clear that the simple password scheme is no longer sufficient. In fact there are multiple, high profile cases where passwords have failed both the users and the organizations that provide services, leading to identity theft and data loss. The impact of such breaches is more costly than ever with financial penalties associated to breach of regulatory compliance and the impact of lost business and loss of confidence. This white paper will explore how two-factor authentication can be considered as an alternative to provide secure authentication in order to resolve the risks of unauthorized access to corporate resources. Why static passwords are insufficient - My password is 1234, and I wrote it down Passwords have long been used as a way to authenticate users and provide them services. They rely on the simple fact that only the users know the password and no one else does. This was initially perceived as an effective solution but with the proliferation of systems and resources that require password entry prior to access, the model breaks down in a number of ways. Authentication vs. Authorization Authentication and authorization are often, and mistakenly, used interchangeably. Authentication is the process of verifying that you are who you say are, while authorization is the process of verifying that you are permitted to do what you are trying to do. Authentication precedes authorization. Written down passwords Human memory is known to fail. If a user forgets their password, they typically have to call the IT helpdesk, or reset the password before access is granted again. Since this disrupts a users workflow, many users write down passwords, and often leave it next to their place of work, in their laptop bag, or on their laptop! This is a clear security risk as anyone with physical access to the office cube or laptop has complete and unauthorized, access. A recent survey carried out amongst IT professionals confirmed that 29% of respondents knew a colleague s password details. The risk presented by written down passwords is even greater when considered in context of the volume of connected devices that are lost every day. Surveys suggest that as many as 15,000 laptops are misplaced at airports in Europe and the USA every week. If any of these have an accompanying post-it note with a password attached then no amount of security can protect the organization from loss. Sharing of passwords with websites Since users have to remember so many passwords, they tend to create a standard password and re-use it in multiple places. This means that if the password is compromised in one place the hacker has access to multiple sites and services. Replay attacks Even if the user is extremely careful with their passwords, static passwords are vulnerable to Replay Attacks. After the user enters the password on a site or application, it has to be sent to an authentication server for validation. An intruder can intercept this session or transmission and replay it later on to gain unauthorized access

Social Engineering and Phishing Criminals have used deception for millennia in order to extract confidential information from others. Deception can include face to face diversion tactics and behavioral manipulation but in the computing age, it can also be carried out without the need for in person interaction. Phishing attacks are extremely common and are a source of significant data theft. In a phishing attack, the phisher will send an email that appears to come from a legitimate source such as a bank, requesting the recipient to log in to their account or to verify their account details. The email directs the user to a fraudulent website where account details are captured and can be used to commit fraud. With the evolving complexity and intelligence of fraudulent attacks, the increase in the number of systems requiring password access, and the fact that users will address this by standardizing their passwords and will then write them down, how can organizations protect themselves against such a broad range of issues that can result in attacks on their systems? Introducing two-factor authentication Authentication based on passwords is based on what a user knows. It is reasonable to augment security by enhancing it with what a user has. This simple concept is the basis of two-factor authentication. What you know a password or Personal Identification Number (PIN) What you have a unique physical characteristic, or device, that only the user has access to With such a scheme, even if a users password or PIN is compromised, the attacker will not be able to gain access to the site or service since they don t possess the second factor required in order to gain access. Conversely, if the attacker gains access to the device that provides the second factor authentication, they won t know the users password or PIN. ATM, or debit cards are the most common example of two-factor authentication. If the card is ever lost or stolen, it still can t be used without the PIN. Even if an unauthorized user knows the PIN of the bank account, they will still not be able to withdraw money since they don t have the actual ATM card. One is rendered useless without the other. One Time Passwords ATM cards provide two-factor authentication in the tightly controlled environment of ATM machines, where each machine is equipped with a special card reader. It is not feasible to equip every laptop, desktop or tablet with a special device to read a card. That would be cost-prohibitive, time-consuming and extremely impractical. To provide two-factor authentication for computer services and sites, users rely on a One Time Password that is generated on a device that is uniquely assigned to a user. One Time Passwords (OTP) provides security in a number of ways. Always Changing The OTP changes after a fixed interval of time, commonly every 60 seconds. Even if an unauthorized user noted the OTP, they won t be able to use it since it would have changed for the next session.

Tied to a device OTPs are generated using a seed that is uniquely associated with a device. Thus, every user s OTP will be different. Since the device is assigned to a user, the OTP uniquely authenticates a user. and a PC desktop client. By leveraging smart devices or text messaging, the OTP is delivered on demand to the user. And, of course, HOTPin easily integrates with AD. Security for IT and users DirectAccess with HOTPin is actually a security tool masquerading as a user convenience tool, a functional duality that, in other solutions, usually results in a trade-off. Form Factors for OTP delivery One Time Passwords can be delivered to end-users via a variety of methods, each with their own pros and cons. Hardware Tokens Hardware tokens, also commonly referred to as authentication tokens, are pocket sized, battery operated devices which are dedicated to generate OTPs. This is the oldest method of generating OTPs. However, they come with their own set of problems. For remote users, the devices need to be shipped to their site, increasing costs. The battery life of these devices is approximately three years. After that, the devices have to be replaced. Larger organizations usually have to maintain stock for devices that need to be replaced or are lost. A subtle, but important problem is that if these devices are lost or stolen, the user might not notice for a few days. That gives an attacker a window of opportunity. Software Token With the increasing popularity of smart phones, users expect not to carry a dedicated device for generating OTPs. Fortunately, smart phones can be leveraged to generate the OTP. Software tokens, or soft tokens, vastly increase the convenience for end users. If the smart phone is ever lost, the end user will most likely notice that much quicker than hardware token. Some software token apps, such as those from Celestix, can be configured to require a PIN before displaying the OTP further enhancing security. OTPs through text messages / emails One Time Passwords can also be delivered through a text message. This method is convenient for users who might not have smart phones, but still don t want to carry a dedicated device. Receiving the OTP through text messaging means it is completely separated from regular authentication channels, or Out of Band (OOB), increasing security. OTPs can also be sent via emails. So if users have access to emails on their phones, they can opt to receive OTPs via email.

Contact USA +1 (510) 668-0700 UK +44 (0) 1189 596198 Singapore +65 6781 0700 India +91 98 208 90884 Japan +81 (0) 3-5210-2991 www.celestix.com info@celestix.com OTP generating mechanisms There are various proprietary mechanisms for generating One Time Passwords. The Internet Engineering Task Force (IETF), an international body that develops and promotes internet standards, has adopted an algorithm known as HOTP for generating One Time Passwords. Proprietary vs. Standards-based OTPs HOTP is not the only mechanism for generating One Time Passwords. Alternative proprietary solutions exist for generating one time passwords. However, closed and proprietary solutions have always presented enterprises with multiple challenges. Vendor lock-in Once an enterprise adopts a proprietary system, they often find themselves beholden to the vendor of the solution. Migrating to another solution often becomes impossible. Since there is no open interoperability, customers are locked-in to higher prices and typically, older technologies. RSA SecurID breach RSA, a division of EMC, provides RSA SecurID, as a two-factor authentication solution. In March 2011, RSA announced that they were subject to an attack which allegedly compromised the security of the One Time Password generation. Customers had to replace the tokens and employ security monitoring services to ensure that their information was not breached. While complementary, these required significant investment in time and posed tactical challenges for customers. Security through obscurity Proprietary algorithms, by definition, are not vetted by security analysts or academic researchers. Relying on open standards ensures that security is not compromised by vulnerabilities in proprietary software or algorithms. Integrating Two-factor authentication Mature two-factor solutions, like Celestix HOTPin, provide an embedded RADIUS server. This can be used to integrate Celestix HOTPin with any remote access gateway solution (e.g. Juniper SA series). For Microsoft UAG specifically, Celestix provides a custom agent that ensures users credentials are properly passed on to applications, providing true Single Sign-On. After integration, users have to enter their username, PIN and OTP to authenticate. OTPs are generated on smart phones, hardware tokens (like Celestix Touch) or received through text messages. About Celestix HOTPin Celestix HOTPin enables organizations to provide market-leading levels of authentication to remote users, while lowering the on-going cost of provisioning, management and ownership. Celestix HOTPin is a tokenless two-factor authentication solution that enables organizations to empower their mobile workforce while ensuring industry leading protection of digital identities and protecting against unsolicited access to corporate resources, a primary reason for the loss of data. Celestix HOTPin enables organizations not only to mobilize their workforce but allows them also to leverage the remote workers smart device, PC or tablet to act as a token capable of generating an event based one-time password (OTP). 2012 Celestix Networks Inc. All rights reserved. Version 1.0