SlideShare a Scribd company logo
1 of 11
Download to read offline
PortalGuard dba PistolStar, Inc.
PO Box 1226
Amherst, NH 03031 USA
Phone: 603.547.1200
Fax: 617.674.2727
E-mail: sales@portalguard.com
Website: www.portalguard.com
© 2012, PistolStar, Inc. dba PortalGuard All Rights Reserved.
Contextual Authentication:
A Multi-factor Approach
v.3.2-003
Multi-factor Authentication Layer
© 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 1
Tech Brief — Contextual Authentication
PortalGuard Contextual Authentication
A Multi-factor Approach
Table of Contents
Summary................................................................................................. 2
The Basics............................................................................................... 2
PortalGuard Contextual Authentication (CBA) ......................................... 2
Contextual Authentication vs. Static Authentication...................... 3
Features .................................................................................................. 3
Benefits ................................................................................................... 4
CBA Terminology .................................................................................... 4
How it Works ........................................................................................... 6
Analysis Mode.............................................................................. 6
Client-side Browser Add-on.......................................................... 6
CBA Process................................................................................ 6
Configuration ........................................................................................... 8
Deployment ............................................................................................. 8
IIS Install.................................................................................................. 8
System Requirements ............................................................................. 9
Supporting Videos ................................................................................... 9
Platform Layers ....................................................................................... 9
© 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 2
Tech Brief — Contextual Authentication
Summary
Increases in roaming user populations and remote access to organizations’ confidential
data is becoming a larger security concern, leaving organizations with choices to make
about how to secure these resources. A conflict of interest between business groups and
IT security can create a struggle to maintain usability while increasing security. Although
instituting better password policies is a preliminary option, organizations are often over
steering towards rigid two-factor authentication solutions.
Although these solutions are desirable for security, the barriers to entry for many organiza-
tions are overwhelming. By applying stringent two-factor authentication to all users, it is
not possible for the organization to adapt to all the different user access scenarios, usually
resulting in poor user adoption and increased frustrations. Due to the size and structure of
these solutions, integration usually requires dedicated IT resources and training, along
with the potential of additional hardware. However, the biggest barrier is high total cost of
ownership. The organization has the intention of increasing security but cannot handle the
costs associated with the initial purchase and maintenance of a two-factor solution, rang-
ing from hardware replacements to increased Help Desk calls.
So you have to make a tough decision, do you institute better password policies? Or
should you implement two-factor authentication across the whole company?
Which makes you wonder…is there a midpoint between the two?
The Basics
The midpoint is referred to as “contextual authentication” which is focused on providing
dynamic security to enhance usability for users and strengthen security to match your or-
ganization’s policies and compliance standards.
Contextual authentication works behind-the-scenes to prevent unauthorized access and
applies the appropriate level of authentication based on the expected impact of the context
around a user’s access request, including location, time, device, network and application.
For example, users’ within your company’s four walls may only need to provide strong
passwords whereas a traveling salesperson or roaming user must provide two-factors.
However, a traveling salesperson now in the office only needs to provide a password to
prove his identity due to his new situation when requesting access.
PortalGuard Contextual Authentication (CBA)
As an alternative to static authentication solutions, PortalGuard understands the midpoint
and handles the challenges of remote user access scenarios. By taking a cost effective,
flexible approach to authentication PortalGuard offers five methods of authentication
(single sign-on, password-based, knowledge-based, two-factor authentication, and block a
request) with the primary focus of the software platform being CBA.
Using PortalGuard’s CBA, organizations can now gain insight into user access scenarios
allowing them to make security and usability adjustments transparently to the user and
dynamically adjust the authentication method to what is appropriate based on the user’s
situation.
© 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 3
Tech Brief — Contextual Authentication
Obtaining the user’s contextual data is optional with PortalGuard and all options can be
configured down to the individual user, group or application levels.
Features
 Provides five different authentication methods – single sign-on, password-based,
knowledge-based, two-factor, and blocking a request
 Contextual Authentication (CBA) –applies the appropriate authentication method for
each access request depending on the user’s context
 Client-side browser add-on – optionally obtain users contextual data such as location,
time, network, and type of device used
 Provides two-factor authentication by delivering a one-time password (OTP) to a user
via SMS, email, printer, or to their laptop in the form of a transparent token (i.e. the client
-side browser add-on producing a cookie)
 SAML single sign-on: can create a SAML token and enable SAML single sign-on to
Cloud/Web-based applications to accept SAML tokens
 Real-time Activity Alerts – alerting the admin or user to malicious activity or “did you
know” information
 Notifications – including emails to a user of access with their account from a new device
 Reporting Tool – contextual data reports allow you to take real-time action on meaning-
ful situations
 All events are stored in a SQL database for easy auditing and reporting
© 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 4
Tech Brief — Contextual Authentication
Benefits
 Increase Security without impacting the end-user experience
 Increase Usability for authorized users while creating barriers for unauthorized users
 Configurable – to the user, group or application levels
 Lower Total Cost of ownership than token-based two-factor authentication alternatives
 Proactive approach to reducing threats - block suspicious users in real-time before a
login attempt is made
 Gather Insight – analyze the contextual data reports PortalGuard provides
CBA Terminology
Authentication Methods: the type of authentication the user will be presented with:
 Single Sign-on: username and password (single password for multiple systems)
 Password-based: username and password
 Knowledge-based: username, password and challenge question
 One-time Password (OTP): username and OTP
 Two-factor: username, password and OTP
Credibility Score: the numeric value that is used to determine the appropriate authentica-
tion method based on a set of ranges - determined from credibility policies
Credibility Policy: configurable policies based on categories and identifiers to which you
assign a score. A credibility policy can have multiple categories.
 Category - collection of related identifiers (context); currently includes device,
time, location, and network. A category can have multiple identifiers.
 Identifier - individual attributes that are assigned scores based on their im-
portance (Ex. Time: off hours, office hours, and weekend hours)
 Weight (%) - an optional percentage for each category that adjusts the catego-
ry’s impact on the credibility score versus other categories
Application Realms: identifies an application and assigns a weight (%) to that application
that adjusts the overall credibility score (Ex. The application realm is 50% and the current
score is 100, after the realm is enforced, the user has a score of 50).
© 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 5
Tech Brief — Contextual Authentication
Credibility Policy
Application Realms
© 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 7
Tech Brief — Contextual Authentication
NOTE: Steps 2-4 happen behind the scenes, transparently to the user and within millisec-
onds.
Step 2: Contextual data is sent from the client-side browser add-on to the PortalGuard
server.
Step 3: The PortalGuard server identifies a user’s credibility policy and computes the fol-
lowing:
 Gross score for each category
 Any category weight impact to the score
 Net score from the policy and weights
 Modification due to sensitivity of requested application
Step 4: The PortalGuard server looks up the appropriate authentication method using the
final credibility score and previously set ranges which the administrator configured.
Step 5: PortalGuard enforced the appropriate authentication method for the user’s current
access attempt. The user provides the required credentials to successfully complete their
access request and login.
Ex. Two-factor Authentication
© 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 8
Tech Brief — Contextual Authentication
Configuration
NOTE: All the following settings are policy specific, so you can have different values for
different users/group/hierarchies.
Configurable through the PortalGuard Configuration Utility:
 Enable or Disable CBA
 Assign users or groups to individual credibility policies
 Credibility Policies:
 Client Type
 Use Category Weighting
 Enforce Application Realms
 Display Scoring UI
 Categories
 Weight
 Identifiers
 Credibility Score
 Default Ranges
 Start and End Scores
 Authentication Type
 Alert On or Off
 Application Realms
 Application Name and URL
 Modifier %
 Servers
Deployment
Implementation of the PortalGuard platform is seamless and requires no changes to Active
Directory/LDAP schema. A server-side software installation is required on at least one IIS
server on the network. Additional client-side software is required with contextual authenti-
cation in the form of the browser add-on which is installed using a standard MSI and can
be pushed out silently.
IIS Install
A MSI is used to install PortalGuard on IIS 6 or 7.x. If installing PortalGuard on IIS 7.x/
Windows Server 2008, make sure to have installed the following feature roles prior to
launching the MSI:
1. All the Web Server Management Tools role services
2. All the Application Development role services
3. All IIS 6 Management Compatibility role services
The MSI is a wizard-based install which will quickly guide you through the installation.
© 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 9
Tech Brief — Contextual Authentication
System Requirements
This version of PortalGuard supports direct access and authentication to cloud/browser-
based applications, only.
PortalGuard can be installed directly on the following web servers:
 IBM WebSphere/WebSphere Portal v5.1 or higher
 Microsoft IIS 6.0 or higher
 Microsoft Windows SharePoint Services 3.0 or higher
 Microsoft Office SharePoint Server 2007 or later
The PortalGuard Web server also has the following requirements on Windows operating
systems:
 .NET 2.0 framework or later must be installed
 (64-bit OS only) Microsoft Visual C++ 2005 SP1 Redistributable Package (x64)
PortalGuard is fully supported for installation on virtual machines. Furthermore, Portal-
Guard can currently be installed on the following platforms:
 Microsoft Windows Server 2000
 Microsoft Windows Server 2003 (32 or 64-bit)
 Microsoft Windows Server 2008 (32 or 64-bit)
 Microsoft Windows Server 2008 R2
PortalGuard works with Windows Terminal Services on Win2003 servers and Remote
Desktop Services on Win2008 servers.
If you have a platform not listed here, please contact us at sales@portalguard.com to see
if we have recently added support for your platform.
Supporting Videos
Please view the following videos to watch a demo of PortalGuard’s CBA Offerings:
Welcome to the Platform: Discussing Contextual Authentication
Consumerization Challenges: Discussing Device Management
Platform Layers
Beyond contextual authentication, PortalGuard is a flexible authentication platform with
multiple layers of available functionality to help you achieve your authentication goals:
 Tokenless Two-factor Authentication
 Self-service Password Reset
 Real-time Reports / Alerts
 Knowledge-based
 Password Management
 Single Sign-on
© 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 10
Tech Brief — Contextual Authentication
###

More Related Content

What's hot

A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionIRJET Journal
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.SrinivasuluIJCST - ESRG Journals
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftHendrix Bodden
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsBayalagmaa Davaanyam
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disneykamensm02
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET Journal
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System AuthenticationIJERA Editor
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...1crore projects
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPace IT at Edmonds Community College
 

What's hot (17)

Identity Management
Identity ManagementIdentity Management
Identity Management
 
A Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice RecognitionA Review on Two Level Authentication Using Image Selection and Voice Recognition
A Review on Two Level Authentication Using Image Selection and Voice Recognition
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Sms based otp
Sms based otpSms based otp
Sms based otp
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
[IJCST-V5I6P2]:T. Sudharan Simha, D.Srinivasulu
 
Enterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoftEnterprise Mobile Security for PeopleSoft
Enterprise Mobile Security for PeopleSoft
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
 
test
testtest
test
 
M Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At DisneyM Kamens Iia Financial Services Presentation At Disney
M Kamens Iia Financial Services Presentation At Disney
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
 
Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...Continuous and Transparent User Identity Verification for Secure Internet Ser...
Continuous and Transparent User Identity Verification for Secure Internet Ser...
 
PACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account ManagementPACE-IT, Security + 5.3: Security Controls for Account Management
PACE-IT, Security + 5.3: Security Controls for Account Management
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and TechniquesPACE-IT, Security+ 4.1: Application Security Controls and Techniques
PACE-IT, Security+ 4.1: Application Security Controls and Techniques
 

Viewers also liked

3. behavioral theory of learning 4. cognitive theoties of learning mirasol ...
3. behavioral theory of learning 4. cognitive theoties of learning   mirasol ...3. behavioral theory of learning 4. cognitive theoties of learning   mirasol ...
3. behavioral theory of learning 4. cognitive theoties of learning mirasol ...AhL'Dn Daliva
 
Salesforce Solution For Software Industry
Salesforce Solution For Software IndustrySalesforce Solution For Software Industry
Salesforce Solution For Software Industrykdwangxi
 
Allow Us to Introduce Skillrater
Allow Us to Introduce SkillraterAllow Us to Introduce Skillrater
Allow Us to Introduce SkillraterLouis Carter
 
How to configure dhcp on a cisco asa 5505
How to configure dhcp on a cisco asa 5505How to configure dhcp on a cisco asa 5505
How to configure dhcp on a cisco asa 5505IT Tech
 
Effective Tuition Reimbursement
Effective Tuition ReimbursementEffective Tuition Reimbursement
Effective Tuition ReimbursementStraighterLine
 
Perrone crafting outstandingpresentationsstorytelling
Perrone crafting outstandingpresentationsstorytellingPerrone crafting outstandingpresentationsstorytelling
Perrone crafting outstandingpresentationsstorytellingTihamer
 
青年創業計畫書申請表(續貸範例)青輔會 詹翔霖顧問-
青年創業計畫書申請表(續貸範例)青輔會 詹翔霖顧問-青年創業計畫書申請表(續貸範例)青輔會 詹翔霖顧問-
青年創業計畫書申請表(續貸範例)青輔會 詹翔霖顧問-文化大學
 
C# 4.0 linq 與泛型應用(簡介與開發) 第二天
C# 4.0 linq 與泛型應用(簡介與開發) 第二天C# 4.0 linq 與泛型應用(簡介與開發) 第二天
C# 4.0 linq 與泛型應用(簡介與開發) 第二天Gelis Wu
 
Introduction à GStreamer
Introduction à GStreamerIntroduction à GStreamer
Introduction à GStreamerNicolas Hennion
 
Airport Cookie
Airport CookieAirport Cookie
Airport CookieLouis Ng
 
VO Course 10: Big data challenges in astronomy
VO Course 10: Big data challenges in astronomyVO Course 10: Big data challenges in astronomy
VO Course 10: Big data challenges in astronomyJoint ALMA Observatory
 
Facebook for Real Estate: Attracting Buyers and Sellers with Facebook
Facebook for Real Estate:  Attracting Buyers and Sellers with FacebookFacebook for Real Estate:  Attracting Buyers and Sellers with Facebook
Facebook for Real Estate: Attracting Buyers and Sellers with FacebookSocial Jack
 
My ideal job
My ideal jobMy ideal job
My ideal jobpsr821
 
ASSESSING THE EFFICACY OF SOMATIC EXPERIENCING FOR REDUCING SYMPTOMS OF ANXIE...
ASSESSING THE EFFICACY OF SOMATIC EXPERIENCING FOR REDUCING SYMPTOMS OF ANXIE...ASSESSING THE EFFICACY OF SOMATIC EXPERIENCING FOR REDUCING SYMPTOMS OF ANXIE...
ASSESSING THE EFFICACY OF SOMATIC EXPERIENCING FOR REDUCING SYMPTOMS OF ANXIE...Michael Changaris
 
Use of Star Schema in Health Care
Use of Star Schema in Health CareUse of Star Schema in Health Care
Use of Star Schema in Health CareVINEETH M
 
Creating an Extraordinary Custom Garage #NJ #Garage
Creating an Extraordinary Custom Garage #NJ #GarageCreating an Extraordinary Custom Garage #NJ #Garage
Creating an Extraordinary Custom Garage #NJ #GarageEncore Garage
 
Intro to axure
Intro to axureIntro to axure
Intro to axureNathan Gao
 
Jackie robinson
Jackie robinsonJackie robinson
Jackie robinsonwcbball
 

Viewers also liked (20)

Dogster digital2
Dogster digital2Dogster digital2
Dogster digital2
 
Fisica informe 8
Fisica informe 8Fisica informe 8
Fisica informe 8
 
3. behavioral theory of learning 4. cognitive theoties of learning mirasol ...
3. behavioral theory of learning 4. cognitive theoties of learning   mirasol ...3. behavioral theory of learning 4. cognitive theoties of learning   mirasol ...
3. behavioral theory of learning 4. cognitive theoties of learning mirasol ...
 
Salesforce Solution For Software Industry
Salesforce Solution For Software IndustrySalesforce Solution For Software Industry
Salesforce Solution For Software Industry
 
Allow Us to Introduce Skillrater
Allow Us to Introduce SkillraterAllow Us to Introduce Skillrater
Allow Us to Introduce Skillrater
 
How to configure dhcp on a cisco asa 5505
How to configure dhcp on a cisco asa 5505How to configure dhcp on a cisco asa 5505
How to configure dhcp on a cisco asa 5505
 
Effective Tuition Reimbursement
Effective Tuition ReimbursementEffective Tuition Reimbursement
Effective Tuition Reimbursement
 
Perrone crafting outstandingpresentationsstorytelling
Perrone crafting outstandingpresentationsstorytellingPerrone crafting outstandingpresentationsstorytelling
Perrone crafting outstandingpresentationsstorytelling
 
青年創業計畫書申請表(續貸範例)青輔會 詹翔霖顧問-
青年創業計畫書申請表(續貸範例)青輔會 詹翔霖顧問-青年創業計畫書申請表(續貸範例)青輔會 詹翔霖顧問-
青年創業計畫書申請表(續貸範例)青輔會 詹翔霖顧問-
 
C# 4.0 linq 與泛型應用(簡介與開發) 第二天
C# 4.0 linq 與泛型應用(簡介與開發) 第二天C# 4.0 linq 與泛型應用(簡介與開發) 第二天
C# 4.0 linq 與泛型應用(簡介與開發) 第二天
 
Introduction à GStreamer
Introduction à GStreamerIntroduction à GStreamer
Introduction à GStreamer
 
Airport Cookie
Airport CookieAirport Cookie
Airport Cookie
 
VO Course 10: Big data challenges in astronomy
VO Course 10: Big data challenges in astronomyVO Course 10: Big data challenges in astronomy
VO Course 10: Big data challenges in astronomy
 
Facebook for Real Estate: Attracting Buyers and Sellers with Facebook
Facebook for Real Estate:  Attracting Buyers and Sellers with FacebookFacebook for Real Estate:  Attracting Buyers and Sellers with Facebook
Facebook for Real Estate: Attracting Buyers and Sellers with Facebook
 
My ideal job
My ideal jobMy ideal job
My ideal job
 
ASSESSING THE EFFICACY OF SOMATIC EXPERIENCING FOR REDUCING SYMPTOMS OF ANXIE...
ASSESSING THE EFFICACY OF SOMATIC EXPERIENCING FOR REDUCING SYMPTOMS OF ANXIE...ASSESSING THE EFFICACY OF SOMATIC EXPERIENCING FOR REDUCING SYMPTOMS OF ANXIE...
ASSESSING THE EFFICACY OF SOMATIC EXPERIENCING FOR REDUCING SYMPTOMS OF ANXIE...
 
Use of Star Schema in Health Care
Use of Star Schema in Health CareUse of Star Schema in Health Care
Use of Star Schema in Health Care
 
Creating an Extraordinary Custom Garage #NJ #Garage
Creating an Extraordinary Custom Garage #NJ #GarageCreating an Extraordinary Custom Garage #NJ #Garage
Creating an Extraordinary Custom Garage #NJ #Garage
 
Intro to axure
Intro to axureIntro to axure
Intro to axure
 
Jackie robinson
Jackie robinsonJackie robinson
Jackie robinson
 

Similar to Contextual Authentication: A Multi-factor Approach

Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachPortalGuard
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodIRJET Journal
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM csandit
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET Journal
 
Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and CompliancePortalGuard
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webSafeNet
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODEIRJET Journal
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxgilpinleeanna
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing IRJET Journal
 
How to Improve Overall Performance & Security For Any eCommerce Website In 2023
How to Improve Overall Performance & Security For Any eCommerce Website In 2023How to Improve Overall Performance & Security For Any eCommerce Website In 2023
How to Improve Overall Performance & Security For Any eCommerce Website In 2023Galaxy Weblinks
 

Similar to Contextual Authentication: A Multi-factor Approach (20)

Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and ChallengesIRJET- Data Privacy and Security Industry – Opportunities and Challenges
IRJET- Data Privacy and Security Industry – Opportunities and Challenges
 
Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and Compliance
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Overview one pager
Overview one pagerOverview one pager
Overview one pager
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
How to Improve Overall Performance & Security For Any eCommerce Website In 2023
How to Improve Overall Performance & Security For Any eCommerce Website In 2023How to Improve Overall Performance & Security For Any eCommerce Website In 2023
How to Improve Overall Performance & Security For Any eCommerce Website In 2023
 

More from PortalGuard

Let's Build a Better Password
Let's Build a Better PasswordLet's Build a Better Password
Let's Build a Better PasswordPortalGuard
 
Designing and Implementing a Secure, Fully Brandable Web Portal
Designing and Implementing a Secure, Fully Brandable Web PortalDesigning and Implementing a Secure, Fully Brandable Web Portal
Designing and Implementing a Secure, Fully Brandable Web PortalPortalGuard
 
Designing and Creating a Secure Web Portal
Designing and Creating a Secure Web PortalDesigning and Creating a Secure Web Portal
Designing and Creating a Secure Web PortalPortalGuard
 
PortalGuard Product Tour
PortalGuard Product TourPortalGuard Product Tour
PortalGuard Product TourPortalGuard
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive OverviewPortalGuard
 
The Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving ComplianceThe Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving CompliancePortalGuard
 
PortalGuard Platform
PortalGuard PlatformPortalGuard Platform
PortalGuard PlatformPortalGuard
 
Already Have a Solution?
Already Have a Solution? Already Have a Solution?
Already Have a Solution? PortalGuard
 
Sever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple PasswordsSever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple PasswordsPortalGuard
 
Password Security and CJIS Compliance
Password Security and CJIS CompliancePassword Security and CJIS Compliance
Password Security and CJIS CompliancePortalGuard
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AlonePortalGuard
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 

More from PortalGuard (13)

Let's Build a Better Password
Let's Build a Better PasswordLet's Build a Better Password
Let's Build a Better Password
 
Designing and Implementing a Secure, Fully Brandable Web Portal
Designing and Implementing a Secure, Fully Brandable Web PortalDesigning and Implementing a Secure, Fully Brandable Web Portal
Designing and Implementing a Secure, Fully Brandable Web Portal
 
Designing and Creating a Secure Web Portal
Designing and Creating a Secure Web PortalDesigning and Creating a Secure Web Portal
Designing and Creating a Secure Web Portal
 
PortalGuard Product Tour
PortalGuard Product TourPortalGuard Product Tour
PortalGuard Product Tour
 
SSPM Retail
SSPM RetailSSPM Retail
SSPM Retail
 
SAML Executive Overview
SAML Executive OverviewSAML Executive Overview
SAML Executive Overview
 
The Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving ComplianceThe Role of Password Management in Achieving Compliance
The Role of Password Management in Achieving Compliance
 
PortalGuard Platform
PortalGuard PlatformPortalGuard Platform
PortalGuard Platform
 
Already Have a Solution?
Already Have a Solution? Already Have a Solution?
Already Have a Solution?
 
Sever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple PasswordsSever-based Password Synchronization: Managing Multiple Passwords
Sever-based Password Synchronization: Managing Multiple Passwords
 
Password Security and CJIS Compliance
Password Security and CJIS CompliancePassword Security and CJIS Compliance
Password Security and CJIS Compliance
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 

Recently uploaded

Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 

Recently uploaded (20)

Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 

Contextual Authentication: A Multi-factor Approach

  • 1. PortalGuard dba PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail: sales@portalguard.com Website: www.portalguard.com © 2012, PistolStar, Inc. dba PortalGuard All Rights Reserved. Contextual Authentication: A Multi-factor Approach v.3.2-003 Multi-factor Authentication Layer
  • 2. © 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 1 Tech Brief — Contextual Authentication PortalGuard Contextual Authentication A Multi-factor Approach Table of Contents Summary................................................................................................. 2 The Basics............................................................................................... 2 PortalGuard Contextual Authentication (CBA) ......................................... 2 Contextual Authentication vs. Static Authentication...................... 3 Features .................................................................................................. 3 Benefits ................................................................................................... 4 CBA Terminology .................................................................................... 4 How it Works ........................................................................................... 6 Analysis Mode.............................................................................. 6 Client-side Browser Add-on.......................................................... 6 CBA Process................................................................................ 6 Configuration ........................................................................................... 8 Deployment ............................................................................................. 8 IIS Install.................................................................................................. 8 System Requirements ............................................................................. 9 Supporting Videos ................................................................................... 9 Platform Layers ....................................................................................... 9
  • 3. © 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 2 Tech Brief — Contextual Authentication Summary Increases in roaming user populations and remote access to organizations’ confidential data is becoming a larger security concern, leaving organizations with choices to make about how to secure these resources. A conflict of interest between business groups and IT security can create a struggle to maintain usability while increasing security. Although instituting better password policies is a preliminary option, organizations are often over steering towards rigid two-factor authentication solutions. Although these solutions are desirable for security, the barriers to entry for many organiza- tions are overwhelming. By applying stringent two-factor authentication to all users, it is not possible for the organization to adapt to all the different user access scenarios, usually resulting in poor user adoption and increased frustrations. Due to the size and structure of these solutions, integration usually requires dedicated IT resources and training, along with the potential of additional hardware. However, the biggest barrier is high total cost of ownership. The organization has the intention of increasing security but cannot handle the costs associated with the initial purchase and maintenance of a two-factor solution, rang- ing from hardware replacements to increased Help Desk calls. So you have to make a tough decision, do you institute better password policies? Or should you implement two-factor authentication across the whole company? Which makes you wonder…is there a midpoint between the two? The Basics The midpoint is referred to as “contextual authentication” which is focused on providing dynamic security to enhance usability for users and strengthen security to match your or- ganization’s policies and compliance standards. Contextual authentication works behind-the-scenes to prevent unauthorized access and applies the appropriate level of authentication based on the expected impact of the context around a user’s access request, including location, time, device, network and application. For example, users’ within your company’s four walls may only need to provide strong passwords whereas a traveling salesperson or roaming user must provide two-factors. However, a traveling salesperson now in the office only needs to provide a password to prove his identity due to his new situation when requesting access. PortalGuard Contextual Authentication (CBA) As an alternative to static authentication solutions, PortalGuard understands the midpoint and handles the challenges of remote user access scenarios. By taking a cost effective, flexible approach to authentication PortalGuard offers five methods of authentication (single sign-on, password-based, knowledge-based, two-factor authentication, and block a request) with the primary focus of the software platform being CBA. Using PortalGuard’s CBA, organizations can now gain insight into user access scenarios allowing them to make security and usability adjustments transparently to the user and dynamically adjust the authentication method to what is appropriate based on the user’s situation.
  • 4. © 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 3 Tech Brief — Contextual Authentication Obtaining the user’s contextual data is optional with PortalGuard and all options can be configured down to the individual user, group or application levels. Features  Provides five different authentication methods – single sign-on, password-based, knowledge-based, two-factor, and blocking a request  Contextual Authentication (CBA) –applies the appropriate authentication method for each access request depending on the user’s context  Client-side browser add-on – optionally obtain users contextual data such as location, time, network, and type of device used  Provides two-factor authentication by delivering a one-time password (OTP) to a user via SMS, email, printer, or to their laptop in the form of a transparent token (i.e. the client -side browser add-on producing a cookie)  SAML single sign-on: can create a SAML token and enable SAML single sign-on to Cloud/Web-based applications to accept SAML tokens  Real-time Activity Alerts – alerting the admin or user to malicious activity or “did you know” information  Notifications – including emails to a user of access with their account from a new device  Reporting Tool – contextual data reports allow you to take real-time action on meaning- ful situations  All events are stored in a SQL database for easy auditing and reporting
  • 5. © 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 4 Tech Brief — Contextual Authentication Benefits  Increase Security without impacting the end-user experience  Increase Usability for authorized users while creating barriers for unauthorized users  Configurable – to the user, group or application levels  Lower Total Cost of ownership than token-based two-factor authentication alternatives  Proactive approach to reducing threats - block suspicious users in real-time before a login attempt is made  Gather Insight – analyze the contextual data reports PortalGuard provides CBA Terminology Authentication Methods: the type of authentication the user will be presented with:  Single Sign-on: username and password (single password for multiple systems)  Password-based: username and password  Knowledge-based: username, password and challenge question  One-time Password (OTP): username and OTP  Two-factor: username, password and OTP Credibility Score: the numeric value that is used to determine the appropriate authentica- tion method based on a set of ranges - determined from credibility policies Credibility Policy: configurable policies based on categories and identifiers to which you assign a score. A credibility policy can have multiple categories.  Category - collection of related identifiers (context); currently includes device, time, location, and network. A category can have multiple identifiers.  Identifier - individual attributes that are assigned scores based on their im- portance (Ex. Time: off hours, office hours, and weekend hours)  Weight (%) - an optional percentage for each category that adjusts the catego- ry’s impact on the credibility score versus other categories Application Realms: identifies an application and assigns a weight (%) to that application that adjusts the overall credibility score (Ex. The application realm is 50% and the current score is 100, after the realm is enforced, the user has a score of 50).
  • 6. © 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 5 Tech Brief — Contextual Authentication Credibility Policy Application Realms
  • 7.
  • 8. © 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 7 Tech Brief — Contextual Authentication NOTE: Steps 2-4 happen behind the scenes, transparently to the user and within millisec- onds. Step 2: Contextual data is sent from the client-side browser add-on to the PortalGuard server. Step 3: The PortalGuard server identifies a user’s credibility policy and computes the fol- lowing:  Gross score for each category  Any category weight impact to the score  Net score from the policy and weights  Modification due to sensitivity of requested application Step 4: The PortalGuard server looks up the appropriate authentication method using the final credibility score and previously set ranges which the administrator configured. Step 5: PortalGuard enforced the appropriate authentication method for the user’s current access attempt. The user provides the required credentials to successfully complete their access request and login. Ex. Two-factor Authentication
  • 9. © 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 8 Tech Brief — Contextual Authentication Configuration NOTE: All the following settings are policy specific, so you can have different values for different users/group/hierarchies. Configurable through the PortalGuard Configuration Utility:  Enable or Disable CBA  Assign users or groups to individual credibility policies  Credibility Policies:  Client Type  Use Category Weighting  Enforce Application Realms  Display Scoring UI  Categories  Weight  Identifiers  Credibility Score  Default Ranges  Start and End Scores  Authentication Type  Alert On or Off  Application Realms  Application Name and URL  Modifier %  Servers Deployment Implementation of the PortalGuard platform is seamless and requires no changes to Active Directory/LDAP schema. A server-side software installation is required on at least one IIS server on the network. Additional client-side software is required with contextual authenti- cation in the form of the browser add-on which is installed using a standard MSI and can be pushed out silently. IIS Install A MSI is used to install PortalGuard on IIS 6 or 7.x. If installing PortalGuard on IIS 7.x/ Windows Server 2008, make sure to have installed the following feature roles prior to launching the MSI: 1. All the Web Server Management Tools role services 2. All the Application Development role services 3. All IIS 6 Management Compatibility role services The MSI is a wizard-based install which will quickly guide you through the installation.
  • 10. © 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 9 Tech Brief — Contextual Authentication System Requirements This version of PortalGuard supports direct access and authentication to cloud/browser- based applications, only. PortalGuard can be installed directly on the following web servers:  IBM WebSphere/WebSphere Portal v5.1 or higher  Microsoft IIS 6.0 or higher  Microsoft Windows SharePoint Services 3.0 or higher  Microsoft Office SharePoint Server 2007 or later The PortalGuard Web server also has the following requirements on Windows operating systems:  .NET 2.0 framework or later must be installed  (64-bit OS only) Microsoft Visual C++ 2005 SP1 Redistributable Package (x64) PortalGuard is fully supported for installation on virtual machines. Furthermore, Portal- Guard can currently be installed on the following platforms:  Microsoft Windows Server 2000  Microsoft Windows Server 2003 (32 or 64-bit)  Microsoft Windows Server 2008 (32 or 64-bit)  Microsoft Windows Server 2008 R2 PortalGuard works with Windows Terminal Services on Win2003 servers and Remote Desktop Services on Win2008 servers. If you have a platform not listed here, please contact us at sales@portalguard.com to see if we have recently added support for your platform. Supporting Videos Please view the following videos to watch a demo of PortalGuard’s CBA Offerings: Welcome to the Platform: Discussing Contextual Authentication Consumerization Challenges: Discussing Device Management Platform Layers Beyond contextual authentication, PortalGuard is a flexible authentication platform with multiple layers of available functionality to help you achieve your authentication goals:  Tokenless Two-factor Authentication  Self-service Password Reset  Real-time Reports / Alerts  Knowledge-based  Password Management  Single Sign-on
  • 11. © 2012, PistolStar, Inc. dba PortalGuard All rights reserved. Page 10 Tech Brief — Contextual Authentication ###