Two Factor Authentication for Squid Proxy
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Two Factor Authentication for Squid Proxy

  • 1,385 views
Uploaded on

This whitepaper details how ArrayShield IDAS Two Factor authentication system can be integrated with Squid Proxy

This whitepaper details how ArrayShield IDAS Two Factor authentication system can be integrated with Squid Proxy

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,385
On Slideshare
1,385
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
6
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Two-Factor Authentication Solution for Squid Web ProxyTwo-Factor Authentication Solution for Squid WebProxy Problem with exposing Emailing system on the Cloud A web proxy server is a useful service to have on your network, or between your network and the Internet, as it provides an extra security layer that insulates your users from the Internet. Squid is a high-performance and relatively secure web proxy server that includes good caching facilities. It is one of the most commonly used proxy servers on the Internet. But the weakest link in the otherwise secure web proxy is using Username/Password credentials to authenticate the user. It does not protect the proxy server from sophisticated security threats.SolutionArrayShield innovative two factor authentication system - IDAS provides a simple secure accessto the Web proxy server. By using its innovative pattern based authentication it provides One-Time-Secret-Code for every transaction.In IDAS every user is shown with a matrix which is populated with random characters for everytransaction. User has to choose a pattern which is sequence of cells in the matrix and shouldregister the same with the system prior accessing. A translucent card is provided to each userwhich has a similar structured matrix with transparent and opaque cells and some randomcharacters imprinted on the opaque cells. Each card is unique in terms of the position of theopaque cells and the characters imprinted on them.At the time of accessing the web the user is shown with the randomly populated matrix as achallenge in IDAS client application. The user overlaps the translucent card on the shown matrixand will key in the characters present in the chosen pattern in the same order as a response.These characters form the One-Time-Secret-Code for the user for that transaction. TheArrayShield IDAS server verifies the user credentials by comparing user’s registered pattern andthe pattern values entered by the user. Access is given to the user if the user credentials arevalid. ArrayShield | info@arrayshield.com Page 1
  • 2. Two-Factor Authentication Solution for Squid Web ProxyIntegration FlowThe following diagram shows how Squid proxy can be integrated with ArrayShield IDAS to useits two factor authentication for secure and reliable access to web. . Figure: Integration flow diagram-Squid with ArrayShield IDAS ArrayShield | info@arrayshield.com Page 2
  • 3. Two-Factor Authentication Solution for Squid Web ProxyFeaturesInnovative TechnologyArrayShield IDAS technology is patent pending (globally) and has won severalawards/recognitions in various forums for its innovative concept.High Level of SecurityArrayShield IDAS product leverages advanced Encryption methodologies (like Industry StandardAES (128/192/256 bit) algorithms as well as in-house developed advanced cryptographictechniques) and follows Industry Standard Guidelines and Best Practices.Ease of UseArrayShield IDAS is based on user-intuitive patterns which are easy to remember than complexpasswords than can be easily compromised.Easy to IntegrateArrayShield IDAS product will seamlessly integrate with existing enterprise environments withimproved user experience. No expertise is required for integration.Interoperable SystemArrayShield IDAS can also be configured as add-on module with various products of leadingtechnology players. Support is available for SAML, LDAP, RADIUS, TACACS protocol etc.Easy to DeployArrayShield IDAS can be easily deployed in days (not in weeks) because of easy-to-configure APIbased system.Easily CustomizableArrayShield IDAS product can be easily customized to the unique needs of every organization.Once deployed, organizations can also configure the security strength and mechanism to theamount of risk involved in the user’s role and usability requirements.Highly ScalableArrayShield IDAS can be easily scaled with huge user population without affecting theperformance and usability. ArrayShield | info@arrayshield.com Page 3
  • 4. Two-Factor Authentication Solution for Squid Web ProxyBenefitsLow Total Cost of OwnershipArrayShield IDAS provides Strong Authentication at a fraction of cost of traditional alternatives.Minimal Cost is incurred during purchase as well as maintenance. As there is no need of havingcostly hardware tokens or transactional costs incurred because of SMS etc, ArrayShield’sProduct provides lowest Total Cost of Ownership. No costly server hardware needed.Mobility of the userAs ArrayShield uses a simple plastic card that can be carried on the go, it doesn’t have anydependencies. Hence user will be able to access the application any-time, any-where.Provides peace of mindProtects Organizations and customers from Online Identity and data theft, hence provide peaceof mind.Provides Compliance with regulationsRegulatory agencies agree that passwords are a weak link and are requiring companies toimplement stronger authentication. ArrayShield IDAS is a rapid, cost-effective way to complywith Industry Guidelines, Security Standards and other Industry regulations.ConclusionBy using ArrayShield IDAS Two-Factor authentication solution, organizations can enable thesecure access to their web. The solution will make organizations of all sizes and complexitiesprotect from sharing of credentials and malicious attacks happening. ArrayShield | info@arrayshield.com Page 4