Enterprise IT Identity & Access Management

A Buyer's & Integrator's Guide - WebLog Version 1.0

Browse by Tags

Related Posts
  • Blog Post: User Authentication Mechanism (Method)

    User authentication mechanism can use one of above factors or combine multiple factors to form strong authentication. The following are major user authentication mechanisms (methods): · Badge and identity card: Identification badges are usually used for physical access authentication, either by a...
  • Blog Post: Physical Access Control Technology

    A typical physical access control system is made up of following components: - ID Credential - Door Reader - Door Lock - Control Panel - Access Control Server - Software - Database The access control process begins when a user presents the credential (such as employee badge) to...
  • Blog Post: Authentication Protocols and Standards

    Some of most popular authentication protocols and standards are: · KERBEROS v5: Kerberos is an open standard for distributed systems authentication ( RFC 1510 ). It relies on shared secret (or password) authentication by users to an authentication server called a Key Distribution Center (KDC)....
  • Blog Post: User Authentication Factors

    There are four authentication factors: Something one knows: The concept here is that if the user knows a pre-determined secret, he or she must be the right person. The common type of secret is a password or a PIN, though other schemes like images and patterns are being explored. The conventional...
  • Blog Post: Ways to Compromise Password

    Passwords are vulnerable by virtue of the following attacks : Password Cracking Tools - A variety of software tools, such as L0Phtcrack and NT Crack, automate the guessing of passwords through brute force and with extensive dictionaries of frequently used passwords. Network Monitoring - This technique...