Two Factor Authentication for Outlook Web Access


Published on

This whitepaper details how ArrayShield IDAS Two Factor authentication system can be integrated with Outlook Web Access

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Two Factor Authentication for Outlook Web Access

  1. 1. Two-Factor Authentication Solution for Microsoft OWATwo-Factor Authentication Solution for Microsoft OWA(Outlook Web Access) Problem in exposing email web access using Microsoft OWA For a successful business, organizations must provide their employees secure access to their company email accounts. Employees want to check their business email from any location that business sends them and a successful business offers them that capability. The value and volume of the information on internet is staggering. This is an appealing target and your email communications may be at risk. Providing strong security against everyone on the internet who can visit your OWA login page is the problem. The usage of a strong, two-factor authentication to protect remote access is a must for accessing of the company email account from internet.SolutionArrayShield innovative two factor authentication system – IDAS provides a simple secureOutlook Web Access to company. By using its innovative pattern based authentication itprovides One-Time-Secret-Code for every login transaction without using any further smarthardware.In IDAS every user is shown with a matrix on the login screen which is populated with randomcharacters for every transaction. User has to choose a pattern which is a sequence of cells inthe matrix and should register the same with the system prior accessing the Outlook. Atranslucent card is provided to each user which has a similar structured matrix with transparentand opaque cells and some random characters imprinted on the opaque cells. Each card isunique in terms of the position of the opaque cells and the characters imprinted on them.At the time of accessing the email, user is shown with the randomly populated matrix as achallenge. The user overlaps the translucent card on the shown matrix and will key in thecharacters present in the chosen pattern in the same order. These characters form the One-Time-Secret-Code for the user for that transaction. The ArrayShield IDAS server verifies the user ArrayShield | Page 1
  2. 2. Two-Factor Authentication Solution for Microsoft OWAcredentials by comparing user’s registered pattern and the pattern values entered by the user.Access is given to the user if the user credentials are valid.Integration FlowThe following diagram shows how an Microsoft OWA server can be integrated with ArrayShieldIDAS to use its two factor authentication for secure access. Figure: Integration flow diagram for the Microsoft OWA authentication with ArrayShield IDAS ArrayShield | Page 2
  3. 3. Two-Factor Authentication Solution for Microsoft OWAFeaturesInnovative TechnologyArrayShield IDAS Technology is patent pending (globally) and has won severalawards/recognitions in various forums for its innovative concept.High Level of SecurityArrayShield IDAS product leverages advanced Encryption methodologies (like Industry StandardAES (128/192/256 bit) algorithms as well as in-house developed advanced cryptographictechniques) and follows Industry Standard Guidelines and Best Practices.Ease of UseArrayShield IDAS is based on user-intuitive patterns which are easy to remember than complexpasswords than can be easily compromised.Easy to IntegrateArrayShield IDAS product will seamlessly integrate with existing enterprise environments withimproved user experience. No expertise is required for integration.Interoperable SystemArrayShield IDAS can also be configured as add-on module with various products of leadingtechnology players. Support is available for SAML, LDAP, RADIUS, TACACS protocol etc.Easy to DeployArrayShield IDAS can be easily deployed in days (not in weeks) because of easy-to-configure APIbased system.Easily CustomizableArrayShield IDAS product can be easily customized to the unique needs of every organization.Once deployed, organizations can also configure the security strength and mechanism to theamount of risk involved in the user’s role and usability requirements.Highly ScalableArrayShield IDAS system can be easily scaled with huge user population without affecting theperformance and usability. ArrayShield | Page 3
  4. 4. Two-Factor Authentication Solution for Microsoft OWABenefitsLow Total Cost of OwnershipArrayShield IDAS provides Strong Authentication at a fraction of cost of traditional alternatives.Minimal Cost is incurred during purchase as well as maintenance. As there is no need of havingcostly hardware tokens or transactional costs incurred because of SMS etc, ArrayShield’sProduct provides lowest Total Cost of Ownership. No costly server hardware needed.Mobility of the userAs ArrayShield uses a simple plastic card that can be carried on the go, it doesn’t have anydependencies. Hence user will be able to access the application any-time, any-where.Provides peace of mindProtects Organizations and customers from Online Identity and data theft, hence provide peaceof mind.Provides Compliance with regulationsRegulatory agencies agree that passwords are a weak link and are requiring companies toimplement stronger authentication. ArrayShield IDAS authentication system is a rapid, cost-effective way to comply with Industry Guidelines, Security Standards and other Industryregulations.ConclusionBy using ArrayShield IDAS Two-Factor authentication solution, organizations can enable thesecure remote access to their emails. The solution will make organizations of all sizes andcomplexities extend the reach of extranets to remote employee’s in-line with organization’sbusiness strategy. ArrayShield | Page 4