SlideShare a Scribd company logo
Two-Factor Authentication Solution for
                                                             Squid Web Proxy




Two-Factor Authentication Solution for Squid Web
Proxy

   Problem with exposing Emailing system on the Cloud
   A web proxy server is a useful service to have on your network, or between your network
   and the Internet, as it provides an extra security layer that insulates your users from the
   Internet. Squid is a high-performance and relatively secure web proxy server that
   includes good caching facilities. It is one of the most commonly used proxy servers on the
   Internet.   But the weakest link in the otherwise secure web proxy is using
   Username/Password credentials to authenticate the user. It does not protect the proxy
   server from sophisticated security threats.




Solution
ArrayShield innovative two factor authentication system - IDAS provides a simple secure access
to the Web proxy server. By using its innovative pattern based authentication it provides One-
Time-Secret-Code for every transaction.

In IDAS every user is shown with a matrix which is populated with random characters for every
transaction. User has to choose a pattern which is sequence of cells in the matrix and should
register the same with the system prior accessing. A translucent card is provided to each user
which has a similar structured matrix with transparent and opaque cells and some random
characters imprinted on the opaque cells. Each card is unique in terms of the position of the
opaque cells and the characters imprinted on them.

At the time of accessing the web the user is shown with the randomly populated matrix as a
challenge in IDAS client application. The user overlaps the translucent card on the shown matrix
and will key in the characters present in the chosen pattern in the same order as a response.
These characters form the One-Time-Secret-Code for the user for that transaction. The
ArrayShield IDAS server verifies the user credentials by comparing user’s registered pattern and
the pattern values entered by the user. Access is given to the user if the user credentials are
valid.




                             ArrayShield | info@arrayshield.com                        Page 1
Two-Factor Authentication Solution for
                                                                 Squid Web Proxy




Integration Flow

The following diagram shows how Squid proxy can be integrated with ArrayShield IDAS to use
its two factor authentication for secure and reliable access to web.




                                                                                          .




                     Figure: Integration flow diagram-Squid with ArrayShield IDAS




                             ArrayShield | info@arrayshield.com                         Page 2
Two-Factor Authentication Solution for
                                                             Squid Web Proxy



Features

Innovative Technology

ArrayShield IDAS technology is patent pending (globally) and has won                   several
awards/recognitions in various forums for its innovative concept.

High Level of Security

ArrayShield IDAS product leverages advanced Encryption methodologies (like Industry Standard
AES (128/192/256 bit) algorithms as well as in-house developed advanced cryptographic
techniques) and follows Industry Standard Guidelines and Best Practices.

Ease of Use

ArrayShield IDAS is based on user-intuitive patterns which are easy to remember than complex
passwords than can be easily compromised.

Easy to Integrate

ArrayShield IDAS product will seamlessly integrate with existing enterprise environments with
improved user experience. No expertise is required for integration.

Interoperable System

ArrayShield IDAS can also be configured as add-on module with various products of leading
technology players. Support is available for SAML, LDAP, RADIUS, TACACS protocol etc.

Easy to Deploy

ArrayShield IDAS can be easily deployed in days (not in weeks) because of easy-to-configure API
based system.

Easily Customizable

ArrayShield IDAS product can be easily customized to the unique needs of every organization.
Once deployed, organizations can also configure the security strength and mechanism to the
amount of risk involved in the user’s role and usability requirements.

Highly Scalable

ArrayShield IDAS can be easily scaled with huge user population without affecting the
performance and usability.



                             ArrayShield | info@arrayshield.com                      Page 3
Two-Factor Authentication Solution for
                                                              Squid Web Proxy




Benefits

Low Total Cost of Ownership

ArrayShield IDAS provides Strong Authentication at a fraction of cost of traditional alternatives.
Minimal Cost is incurred during purchase as well as maintenance. As there is no need of having
costly hardware tokens or transactional costs incurred because of SMS etc, ArrayShield’s
Product provides lowest Total Cost of Ownership. No costly server hardware needed.

Mobility of the user

As ArrayShield uses a simple plastic card that can be carried on the go, it doesn’t have any
dependencies. Hence user will be able to access the application any-time, any-where.

Provides peace of mind

Protects Organizations and customers from Online Identity and data theft, hence provide peace
of mind.

Provides Compliance with regulations

Regulatory agencies agree that passwords are a weak link and are requiring companies to
implement stronger authentication. ArrayShield IDAS is a rapid, cost-effective way to comply
with Industry Guidelines, Security Standards and other Industry regulations.



Conclusion
By using ArrayShield IDAS Two-Factor authentication solution, organizations can enable the
secure access to their web. The solution will make organizations of all sizes and complexities
protect from sharing of credentials and malicious attacks happening.




                              ArrayShield | info@arrayshield.com                        Page 4

More Related Content

Viewers also liked

Portal Cautivo - PfSense
Portal Cautivo - PfSensePortal Cautivo - PfSense
Portal Cautivo - PfSense
Javier Martin Rivero
 
Curso Avanzado Seguridad Redes
Curso Avanzado Seguridad RedesCurso Avanzado Seguridad Redes
Curso Avanzado Seguridad RedesAntonio Durán
 
SERVIDOR PROXY
SERVIDOR PROXYSERVIDOR PROXY
SERVIDOR PROXY
Alan Simá Ruiz
 
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Max Morales
 
Autenticación de usuarios proxy pfsense 2.1
Autenticación de usuarios proxy pfsense 2.1Autenticación de usuarios proxy pfsense 2.1
Autenticación de usuarios proxy pfsense 2.1
Mauricio Arcas H.
 
Manual Servidor Proxy Squid3
Manual Servidor Proxy Squid3Manual Servidor Proxy Squid3
Manual Servidor Proxy Squid3
Pedro Luis Pantoja González
 
Squid3 - Servidor Proxy
Squid3 - Servidor ProxySquid3 - Servidor Proxy
Squid3 - Servidor Proxy
Totus Muertos
 
Configuracion de proxy squid en centos
Configuracion de proxy squid en centosConfiguracion de proxy squid en centos
Configuracion de proxy squid en centosmurilloyair
 
Administracion servidores
Administracion  servidoresAdministracion  servidores
Administracion servidores
Isaac Gonzalez
 
Curso Squid avanzado
Curso Squid avanzadoCurso Squid avanzado
Curso Squid avanzado
Miguel Angel Nieto
 
Herramientas de Monitorizacion y Administracion Web
Herramientas de Monitorizacion y Administracion WebHerramientas de Monitorizacion y Administracion Web
Herramientas de Monitorizacion y Administracion Web
maesefernando
 
Firewall Casero con gnu/linux (Ubuntu Server 14.04)
Firewall Casero con gnu/linux (Ubuntu Server 14.04)Firewall Casero con gnu/linux (Ubuntu Server 14.04)
Firewall Casero con gnu/linux (Ubuntu Server 14.04)
Remigio Salvador Sánchez
 
Proxy Squid en Ubuntu
Proxy Squid en UbuntuProxy Squid en Ubuntu
Proxy Squid en Ubuntu
jferrer1974
 
Instalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux UbuntuInstalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux Ubuntu
Marcelo Alcivar
 
Instalacion del servidor proxy para conectar una red lan a una pc con salid...
Instalacion del  servidor  proxy para conectar una red lan a una pc con salid...Instalacion del  servidor  proxy para conectar una red lan a una pc con salid...
Instalacion del servidor proxy para conectar una red lan a una pc con salid...Fragatacante
 

Viewers also liked (20)

taller-proxy
taller-proxytaller-proxy
taller-proxy
 
Squid
Squid Squid
Squid
 
Portal Cautivo - PfSense
Portal Cautivo - PfSensePortal Cautivo - PfSense
Portal Cautivo - PfSense
 
Curso Avanzado Seguridad Redes
Curso Avanzado Seguridad RedesCurso Avanzado Seguridad Redes
Curso Avanzado Seguridad Redes
 
SERVIDOR PROXY
SERVIDOR PROXYSERVIDOR PROXY
SERVIDOR PROXY
 
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
 
Autenticación de usuarios proxy pfsense 2.1
Autenticación de usuarios proxy pfsense 2.1Autenticación de usuarios proxy pfsense 2.1
Autenticación de usuarios proxy pfsense 2.1
 
Cómo crear un portal cautivo con easyhotspot
Cómo crear un  portal cautivo con easyhotspotCómo crear un  portal cautivo con easyhotspot
Cómo crear un portal cautivo con easyhotspot
 
Manual Servidor Proxy Squid3
Manual Servidor Proxy Squid3Manual Servidor Proxy Squid3
Manual Servidor Proxy Squid3
 
Squid
Squid Squid
Squid
 
Squid3 - Servidor Proxy
Squid3 - Servidor ProxySquid3 - Servidor Proxy
Squid3 - Servidor Proxy
 
Configuracion de proxy squid en centos
Configuracion de proxy squid en centosConfiguracion de proxy squid en centos
Configuracion de proxy squid en centos
 
Proxy presentacion
Proxy presentacionProxy presentacion
Proxy presentacion
 
Administracion servidores
Administracion  servidoresAdministracion  servidores
Administracion servidores
 
Curso Squid avanzado
Curso Squid avanzadoCurso Squid avanzado
Curso Squid avanzado
 
Herramientas de Monitorizacion y Administracion Web
Herramientas de Monitorizacion y Administracion WebHerramientas de Monitorizacion y Administracion Web
Herramientas de Monitorizacion y Administracion Web
 
Firewall Casero con gnu/linux (Ubuntu Server 14.04)
Firewall Casero con gnu/linux (Ubuntu Server 14.04)Firewall Casero con gnu/linux (Ubuntu Server 14.04)
Firewall Casero con gnu/linux (Ubuntu Server 14.04)
 
Proxy Squid en Ubuntu
Proxy Squid en UbuntuProxy Squid en Ubuntu
Proxy Squid en Ubuntu
 
Instalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux UbuntuInstalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux Ubuntu
 
Instalacion del servidor proxy para conectar una red lan a una pc con salid...
Instalacion del  servidor  proxy para conectar una red lan a una pc con salid...Instalacion del  servidor  proxy para conectar una red lan a una pc con salid...
Instalacion del servidor proxy para conectar una red lan a una pc con salid...
 

More from ArrayShield Technologies Private Limited

PCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield ProductPCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield Product
ArrayShield Technologies Private Limited
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
ArrayShield Technologies Private Limited
 
Problems with biometric authentication
Problems with biometric authenticationProblems with biometric authentication
Problems with biometric authentication
ArrayShield Technologies Private Limited
 
What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
ArrayShield Technologies Private Limited
 
Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
ArrayShield Technologies Private Limited
 
Two Factor Authentication for Salesforce
Two Factor Authentication for SalesforceTwo Factor Authentication for Salesforce
Two Factor Authentication for Salesforce
ArrayShield Technologies Private Limited
 
Two Factor Authentication for Google Apps
Two Factor Authentication for Google AppsTwo Factor Authentication for Google Apps
Two Factor Authentication for Google Apps
ArrayShield Technologies Private Limited
 

More from ArrayShield Technologies Private Limited (7)

PCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield ProductPCQuest reviews ArrayShield Product
PCQuest reviews ArrayShield Product
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Problems with biometric authentication
Problems with biometric authenticationProblems with biometric authentication
Problems with biometric authentication
 
What is Two Factor Authentication
What is Two Factor AuthenticationWhat is Two Factor Authentication
What is Two Factor Authentication
 
Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
 
Two Factor Authentication for Salesforce
Two Factor Authentication for SalesforceTwo Factor Authentication for Salesforce
Two Factor Authentication for Salesforce
 
Two Factor Authentication for Google Apps
Two Factor Authentication for Google AppsTwo Factor Authentication for Google Apps
Two Factor Authentication for Google Apps
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Two Factor Authentication for Squid Proxy

  • 1. Two-Factor Authentication Solution for Squid Web Proxy Two-Factor Authentication Solution for Squid Web Proxy Problem with exposing Emailing system on the Cloud A web proxy server is a useful service to have on your network, or between your network and the Internet, as it provides an extra security layer that insulates your users from the Internet. Squid is a high-performance and relatively secure web proxy server that includes good caching facilities. It is one of the most commonly used proxy servers on the Internet. But the weakest link in the otherwise secure web proxy is using Username/Password credentials to authenticate the user. It does not protect the proxy server from sophisticated security threats. Solution ArrayShield innovative two factor authentication system - IDAS provides a simple secure access to the Web proxy server. By using its innovative pattern based authentication it provides One- Time-Secret-Code for every transaction. In IDAS every user is shown with a matrix which is populated with random characters for every transaction. User has to choose a pattern which is sequence of cells in the matrix and should register the same with the system prior accessing. A translucent card is provided to each user which has a similar structured matrix with transparent and opaque cells and some random characters imprinted on the opaque cells. Each card is unique in terms of the position of the opaque cells and the characters imprinted on them. At the time of accessing the web the user is shown with the randomly populated matrix as a challenge in IDAS client application. The user overlaps the translucent card on the shown matrix and will key in the characters present in the chosen pattern in the same order as a response. These characters form the One-Time-Secret-Code for the user for that transaction. The ArrayShield IDAS server verifies the user credentials by comparing user’s registered pattern and the pattern values entered by the user. Access is given to the user if the user credentials are valid. ArrayShield | info@arrayshield.com Page 1
  • 2. Two-Factor Authentication Solution for Squid Web Proxy Integration Flow The following diagram shows how Squid proxy can be integrated with ArrayShield IDAS to use its two factor authentication for secure and reliable access to web. . Figure: Integration flow diagram-Squid with ArrayShield IDAS ArrayShield | info@arrayshield.com Page 2
  • 3. Two-Factor Authentication Solution for Squid Web Proxy Features Innovative Technology ArrayShield IDAS technology is patent pending (globally) and has won several awards/recognitions in various forums for its innovative concept. High Level of Security ArrayShield IDAS product leverages advanced Encryption methodologies (like Industry Standard AES (128/192/256 bit) algorithms as well as in-house developed advanced cryptographic techniques) and follows Industry Standard Guidelines and Best Practices. Ease of Use ArrayShield IDAS is based on user-intuitive patterns which are easy to remember than complex passwords than can be easily compromised. Easy to Integrate ArrayShield IDAS product will seamlessly integrate with existing enterprise environments with improved user experience. No expertise is required for integration. Interoperable System ArrayShield IDAS can also be configured as add-on module with various products of leading technology players. Support is available for SAML, LDAP, RADIUS, TACACS protocol etc. Easy to Deploy ArrayShield IDAS can be easily deployed in days (not in weeks) because of easy-to-configure API based system. Easily Customizable ArrayShield IDAS product can be easily customized to the unique needs of every organization. Once deployed, organizations can also configure the security strength and mechanism to the amount of risk involved in the user’s role and usability requirements. Highly Scalable ArrayShield IDAS can be easily scaled with huge user population without affecting the performance and usability. ArrayShield | info@arrayshield.com Page 3
  • 4. Two-Factor Authentication Solution for Squid Web Proxy Benefits Low Total Cost of Ownership ArrayShield IDAS provides Strong Authentication at a fraction of cost of traditional alternatives. Minimal Cost is incurred during purchase as well as maintenance. As there is no need of having costly hardware tokens or transactional costs incurred because of SMS etc, ArrayShield’s Product provides lowest Total Cost of Ownership. No costly server hardware needed. Mobility of the user As ArrayShield uses a simple plastic card that can be carried on the go, it doesn’t have any dependencies. Hence user will be able to access the application any-time, any-where. Provides peace of mind Protects Organizations and customers from Online Identity and data theft, hence provide peace of mind. Provides Compliance with regulations Regulatory agencies agree that passwords are a weak link and are requiring companies to implement stronger authentication. ArrayShield IDAS is a rapid, cost-effective way to comply with Industry Guidelines, Security Standards and other Industry regulations. Conclusion By using ArrayShield IDAS Two-Factor authentication solution, organizations can enable the secure access to their web. The solution will make organizations of all sizes and complexities protect from sharing of credentials and malicious attacks happening. ArrayShield | info@arrayshield.com Page 4