Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

2fa technicalsynopsis-linuxremotelogin-120505074222-phpapp01


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

2fa technicalsynopsis-linuxremotelogin-120505074222-phpapp01

  1. 1. Two-Factor Authentication Solution forLinux Remote LoginA r r a y S h i e l d | i n f o @ a r r a y s h i e l d . c o m Page 1Two-Factor Authentication Solution for Linux RemoteLoginSolutionArrayShield innovative two factor authentication system – IDAS provides a simple secureremote access to remote Linux login. By using its innovative pattern based authentication itprovides One-Time-Secret-Code for every login transaction.In IDAS every user is shown with a matrix which is populated with random characters for everytransaction. User has to choose a pattern which is sequence of cells in the matrix and shouldregister the same with the system prior accessing. A translucent card is provided to each userwhich has a similar structured matrix with transparent and opaque cells and some randomcharacters imprinted on the opaque cells. Each card is unique in terms of the position of theopaque cells and the characters imprinted on them.At the time of accessing the remote Linux server through SSH the user is shown with therandomly populated matrix as a challenge in ArrayShield IDAS client application. The useroverlaps the translucent card on the shown matrix and will key in the characters present in thechosen pattern in the same order as a response. These characters form the One-Time-Secret-Code for the user for that transaction. The IDAS server verifies the user credentials bycomparing user’s registered pattern and the pattern values entered by the user. Access is givento the user if the user credentials are valid.Problem with existing Remote login authenticationToday’s organizations use various applications for wide range of business needs. Most ofthese applications run on Unix or Linux servers. Protecting the remote logins of theseservers is the most important way to secure the infrastructure of organizations. As theapplications run on these servers possess most sensitive data of the organization, using aweak authentication mechanism of Username/Password does not protect fromsophisticated security threats.
  2. 2. Two-Factor Authentication Solution forLinux Remote LoginA r r a y S h i e l d | i n f o @ a r r a y s h i e l d . c o m Page 2Integration FlowThe following diagram shows how remote linux server login is integrated with ArrayShield IDASto use its two factor authentication for secure and reliable access to remote servers.s.Figure: Integration flow diagram-Linux Remote Login with ArrayShield IDAS
  3. 3. Two-Factor Authentication Solution forLinux Remote LoginA r r a y S h i e l d | i n f o @ a r r a y s h i e l d . c o m Page 3FeaturesInnovative TechnologyArrayShield IDAS Technology is patent pending (globally) and has won severalawards/recognitions in various forums for its innovative concept.High Level of SecurityArrayShield IDAS product leverages advanced Encryption methodologies (like Industry StandardAES (128/192/256 bit) algorithms as well as in-house developed advanced cryptographictechniques) and follows Industry Standard Guidelines and Best Practices.Ease of UseArrayShield IDAS is based on user-intuitive patterns which are easy to remember than complexpasswords than can be easily compromised.Easy to IntegrateArrayShield IDAS product will seamlessly integrate with existing enterprise environments withimproved user experience. No expertise is required for integration.Interoperable SystemArrayShield IDAS can also be configured as add-on module with various products of leadingtechnology players. Support is available for SAML, LDAP, RADIUS, TACACS protocol etc.Easy to DeployArrayShield IDAS can be easily deployed in days (not in weeks) because of easy-to-configure APIbased system.Easily CustomizableArrayShield IDAS product can be easily customized to the unique needs of every organization.Once deployed, organizations can also configure the security strength and mechanism to theamount of risk involved in the user’s role and usability requirements.Highly ScalableArrayShield IDAS can be easily scaled with huge user population without affecting theperformance and usability.
  4. 4. Two-Factor Authentication Solution forLinux Remote LoginA r r a y S h i e l d | i n f o @ a r r a y s h i e l d . c o m Page 4BenefitsLow Total Cost of OwnershipArrayShield IDAS provides Strong Authentication at a fraction of cost of traditional alternatives.Minimal Cost is incurred during purchase as well as maintenance. As there is no need of havingcostly hardware tokens or transactional costs incurred because of SMS etc, ArrayShield’sProduct provides lowest Total Cost of Ownership. No costly server hardware needed.Mobility of the userAs ArrayShield uses a simple plastic card that can be carried on the go, it doesn’t have anydependencies. Hence user will be able to access the application any-time, any-where.Provides peace of mindProtects Organizations and customers from Online Identity and data theft, hence provide peaceof mind.Provides Compliance with regulationsRegulatory agencies agree that passwords are a weak link and are requiring companies toimplement stronger authentication. ArrayShield is a rapid, cost-effective way to comply withIndustry Guidelines, Security Standards and other Industry regulations.ConclusionBy using ArrayShield IDAS Two-Factor authentication solution, organizations can enable thesecure access to remote login servers. The solution will make organizations of all sizes andcomplexities protect from malicious attacks.