Tag Archives: authentication
Each time you add a new user service to your computing environment, the password burden on your organization grows exponentially. Kerberos greatly simplifies password management, but understanding it is anything but simple. Most people find themselves dragged into depths of … Continue reading
Patrick Townsend and I had a chance to catch up at COMMON earlier this year. I was psyched to learn that Townsend Security is now offering Two Factor Authentication (2FA) for the IBM i. When we started talking about … Continue reading
Or…How a security expert can fall for a phishing scheme Think no one will target your business with phishing attacks? Think again… This confession is a bit hard for me. Just recently I was the target of a phishing attack. … Continue reading
The new IBM i 7.2 release brings several security-related enhancements. Two of them are the ability to use SSO from an IBM i green screen to a remote Telnet or FTP server that also supports Kerberos.
In a recent post I noted that the Target breach once again raised the idea of biometric authentication as means of improving the protection of corporate data. Yet for all of its benefits, adoption of biometric authentication within the IT … Continue reading
You’ll notice that the title of this post is “Biometrics And SSO”; not Biometrics for SSO. This is an important distinction. Most IT shops don’t realize that they can use standard SSO along with biometric authentication to implement unobtrusive two-factor … Continue reading
In the last week or so it has come to light that the way the Target Corporation attackers got into Target’s internal network was by using a vendor’s userID and password. The attackers first compromised the vendor’s corporate network. From … Continue reading
I find this authentication mechanism for accessing Web sites and which was proposed in October 2013 very interesting. The main reasons it’s interesting are that it would be so much easier to register at Web sites, authentication is based on … Continue reading
Many customers download or update data to/from IBM i using XCEL spreadsheets. When they start using Kerberos authentication, end users won’t want to sign-on when they access data through XCEL.
An interesting article in Marsha Hofmann in Wired claims that while the 5th amendment protects your right to not reveal a password, it doesn’t protect your right not to provide your fingerprint.