SlideShare a Scribd company logo
Strong, multi-factor authentication is one of the most cost efficient ways to reduce
security threats within an organization. Although many organizations are hesitant to
introduce strong authentication due to on-boarding and integration issues, we regularly
advise existing and prospective customers to at the very least consider adding it to their
developmental roadmaps.
Watch how to use OX open source for strong, mutli-step, two-factor authentication.
With the newest release of OX now available, implementing organization wide, strong
authentication has never been more flexible. Not only is the OX platform vendor neutral,
but it also supports multiple authentication providers if necessary and customizable
business logic.
So without further ado, here are the 10 +1 most common applications for Multi-
Factor Authentication in Higher ED:
1. Privileged Access (“root”, “Admin,” “System,” or similar privileged access) to large or
critical system: examples of such systems include campus ERP systems with financial
data or student records; identity management systems; centralized backup systems;
DNS servers; DHCP servers; campus web cache boxes, etc.
Typical job titles of MFA user: system administrator, database administrator, DNS
administrator
2. Core Network Devices: “Enable” access to core routers and similar privileged access
to other key network devices (including firewalls and other network security appliances
with traffic visibility)
Typical job titles of MFA user: network engineer, network security engineer
3. Physical access to critical facilities [e.g., machine rooms, telecom switch rooms, colo
facilities, other high value assets]
Typical job titles of MFA user: facilities engineer, computer operator, etc.
4. Access to institutional financial accounts (commercial bank accounts, institutional
brokerage access, etc.); note that this will typically use a credential specified by the bank,
brokerage, etc., not by campus
Typical job titles of MFA user: campus business officer, portfolio administrator, financial
manager
5. Access to HIPAA covered health data (teaching hospital patient records, on campus
health center records, testing center records, etc.)
Typical job titles of MFA user: doctor, hospital/health center administrator, insurance
billing specialist, etc.
6. Financial Aid data: because of the Department of Education special push in this area,
Financial Aid administrators get a special call out (e.g., Department of Education is
pushing 2FA hard tokens to all financial aid admins)
7. High Performance Computing Resources: many so-called supercomputer centers
require 2FA after the unfortunate Stakato attacks.
8. VPN access from off campus (punching through a campus perimeter firewall, or
accessing an especially sensitive internal network)
9. Campus Messaging (e.g., in an effort to preventing phishing and subsequent spam
runs, resulting in widespread phishing)
10. Google (pushed by Google, rather than the campus)
Plus one more (not strictly two factor, think more “alternative factor to traditional
passwords”):
Bonus:
11. Automated (machine-to-machine) connections (e.g., for things like scheduled
bulk data transfers) [think Ssh pre-shared key access]
Article resource:-http://gluu.soup.io/post/449514381/Top-10-Applications-for-Multi-
Factor-Authentication

More Related Content

What's hot

Data base security
Data base securityData base security
Data base security
Sara Nazir
 
Database security
Database securityDatabase security
Database security
Mehrdad Jingoism
 
Cloud Control Matrix
Cloud Control MatrixCloud Control Matrix
Cloud Control Matrix
Allen Zhang
 
Resume2011
Resume2011Resume2011
Resume2011
Lakiasha Walker
 
Basics of cms
Basics of cmsBasics of cms
Basics of cms
Buycmstemplate
 
Database security
Database securityDatabase security
Database security
Arpana shree
 
HSPD-12 LACS
HSPD-12 LACSHSPD-12 LACS
HSPD-12 LACS
nghadiali
 
Resume_abhishek12
Resume_abhishek12Resume_abhishek12
Resume_abhishek12
abhishek sikarwar
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
Prosanta Ghosh
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
gourav kottawar
 
Database Security
Database SecurityDatabase Security
Database Security
ShingalaKrupa
 
UPDATED RESUME
UPDATED RESUMEUPDATED RESUME
Matt Harlow Resume Government 2-2
Matt Harlow Resume Government 2-2Matt Harlow Resume Government 2-2
Matt Harlow Resume Government 2-2
Matthew Harlow
 
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
Johnny Dennis
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
Seth Nurul
 
4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy 4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy
Asigra
 
Database security and 4 topics in it
Database security and 4 topics in itDatabase security and 4 topics in it
Database security and 4 topics in it
kavita thete
 
Medical record system
Medical record systemMedical record system
Alvin Whitaker Resume Jul 2015
Alvin Whitaker Resume  Jul 2015Alvin Whitaker Resume  Jul 2015
Alvin Whitaker Resume Jul 2015
Alvin Whitaker
 
FileAudit Datasheet
FileAudit DatasheetFileAudit Datasheet
FileAudit Datasheet
IS Decisions
 

What's hot (20)

Data base security
Data base securityData base security
Data base security
 
Database security
Database securityDatabase security
Database security
 
Cloud Control Matrix
Cloud Control MatrixCloud Control Matrix
Cloud Control Matrix
 
Resume2011
Resume2011Resume2011
Resume2011
 
Basics of cms
Basics of cmsBasics of cms
Basics of cms
 
Database security
Database securityDatabase security
Database security
 
HSPD-12 LACS
HSPD-12 LACSHSPD-12 LACS
HSPD-12 LACS
 
Resume_abhishek12
Resume_abhishek12Resume_abhishek12
Resume_abhishek12
 
Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013Dbms ii mca-ch12-security-2013
Dbms ii mca-ch12-security-2013
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
Database Security
Database SecurityDatabase Security
Database Security
 
UPDATED RESUME
UPDATED RESUMEUPDATED RESUME
UPDATED RESUME
 
Matt Harlow Resume Government 2-2
Matt Harlow Resume Government 2-2Matt Harlow Resume Government 2-2
Matt Harlow Resume Government 2-2
 
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy 4 Keys of a Robust Data Recovery Strategy
4 Keys of a Robust Data Recovery Strategy
 
Database security and 4 topics in it
Database security and 4 topics in itDatabase security and 4 topics in it
Database security and 4 topics in it
 
Medical record system
Medical record systemMedical record system
Medical record system
 
Alvin Whitaker Resume Jul 2015
Alvin Whitaker Resume  Jul 2015Alvin Whitaker Resume  Jul 2015
Alvin Whitaker Resume Jul 2015
 
FileAudit Datasheet
FileAudit DatasheetFileAudit Datasheet
FileAudit Datasheet
 

Viewers also liked

Triple Pythagoras
Triple PythagorasTriple Pythagoras
Triple Pythagoras
iman zain
 
Presentation1
Presentation1Presentation1
Presentation1
yayuyuliani
 
Perkembangan bahasa indonesia
Perkembangan bahasa indonesiaPerkembangan bahasa indonesia
Perkembangan bahasa indonesia
Amir Fauzi Hasibuan
 
Triptico teorema de pitagoras
Triptico teorema de pitagorasTriptico teorema de pitagoras
Triptico teorema de pitagoras
carpiorojasjordy
 
Theorem of phytagoras
Theorem of phytagorasTheorem of phytagoras
Theorem of phytagoras
Nofi Nofianti
 
Pythagorean theorem
Pythagorean theoremPythagorean theorem
Pythagorean theorem
Edgar Mata
 
Tripel Phytagoras
Tripel Phytagoras Tripel Phytagoras
Tripel Phytagoras
Ummi Rachmawati
 
Powerpoint teorema phytagoras
Powerpoint teorema phytagorasPowerpoint teorema phytagoras
Powerpoint teorema phytagoras
Diah Octavianty
 
Teorema de pitágoras
Teorema de pitágorasTeorema de pitágoras
Teorema de pitágoras
P Valter De Almeida Gomes
 
Ppt Pembuktian Teorema pythagoras
Ppt Pembuktian Teorema pythagorasPpt Pembuktian Teorema pythagoras
Ppt Pembuktian Teorema pythagorasReny Wahyuni
 
Instrumen akreditasi rs_-_final_des_2012
Instrumen akreditasi rs_-_final_des_2012Instrumen akreditasi rs_-_final_des_2012
Instrumen akreditasi rs_-_final_des_2012
Agus Suwarni
 
Lean, Six Sigma, ToC using DMAIC project management
Lean, Six Sigma, ToC  using DMAIC project managementLean, Six Sigma, ToC  using DMAIC project management
Lean, Six Sigma, ToC using DMAIC project management
Simon Misiewicz
 

Viewers also liked (13)

Triple Pythagoras
Triple PythagorasTriple Pythagoras
Triple Pythagoras
 
Presentation1
Presentation1Presentation1
Presentation1
 
Perkembangan bahasa indonesia
Perkembangan bahasa indonesiaPerkembangan bahasa indonesia
Perkembangan bahasa indonesia
 
Triptico teorema de pitagoras
Triptico teorema de pitagorasTriptico teorema de pitagoras
Triptico teorema de pitagoras
 
Theorem of phytagoras
Theorem of phytagorasTheorem of phytagoras
Theorem of phytagoras
 
Pythagorean theorem
Pythagorean theoremPythagorean theorem
Pythagorean theorem
 
Tripel Phytagoras
Tripel Phytagoras Tripel Phytagoras
Tripel Phytagoras
 
Phytagoras
PhytagorasPhytagoras
Phytagoras
 
Powerpoint teorema phytagoras
Powerpoint teorema phytagorasPowerpoint teorema phytagoras
Powerpoint teorema phytagoras
 
Teorema de pitágoras
Teorema de pitágorasTeorema de pitágoras
Teorema de pitágoras
 
Ppt Pembuktian Teorema pythagoras
Ppt Pembuktian Teorema pythagorasPpt Pembuktian Teorema pythagoras
Ppt Pembuktian Teorema pythagoras
 
Instrumen akreditasi rs_-_final_des_2012
Instrumen akreditasi rs_-_final_des_2012Instrumen akreditasi rs_-_final_des_2012
Instrumen akreditasi rs_-_final_des_2012
 
Lean, Six Sigma, ToC using DMAIC project management
Lean, Six Sigma, ToC  using DMAIC project managementLean, Six Sigma, ToC  using DMAIC project management
Lean, Six Sigma, ToC using DMAIC project management
 

Similar to Top 10 applications for multi factor authentication in higher education

Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture,
MITDaveMillaar
 
Discuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docxDiscuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docx
standfordabbot
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
VaishnavGhadge1
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
ftculotta27
 
Cortnie Guerra
Cortnie GuerraCortnie Guerra
Cortnie Guerra
Cortnie Guerra
 
Resume
ResumeResume
Data Security Service Offering-v3
Data Security Service Offering-v3Data Security Service Offering-v3
Data Security Service Offering-v3
Abe Newton
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
Ryan Gallavin
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
gemmarie1
 
Privleged Access Management
Privleged Access ManagementPrivleged Access Management
Privleged Access Management
Lance Peterman
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
Karla Sasser, CPA CITP, CIA, CGMA
 
Mark Fambrough Résumé
Mark Fambrough RésuméMark Fambrough Résumé
Mark Fambrough Résumé
Mark Fambrough
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
Symantec
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
Marco Essomba
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
Techdemocracy
 
User Profiling and Technology
User Profiling and TechnologyUser Profiling and Technology
User Profiling and Technology
Jonathan Daniels
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
robertlesew5
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
papdev
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
Lancy Menezes
 

Similar to Top 10 applications for multi factor authentication in higher education (20)

Assessing Risk: Developing a Client/Server Security Architecture,
 Assessing Risk: Developing a Client/Server Security Architecture,  Assessing Risk: Developing a Client/Server Security Architecture,
Assessing Risk: Developing a Client/Server Security Architecture,
 
Discuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docxDiscuss the challenges of maintaining information security at a remo.docx
Discuss the challenges of maintaining information security at a remo.docx
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
Cortnie Guerra
Cortnie GuerraCortnie Guerra
Cortnie Guerra
 
Resume
ResumeResume
Resume
 
Data Security Service Offering-v3
Data Security Service Offering-v3Data Security Service Offering-v3
Data Security Service Offering-v3
 
The Essentials | Privileged Access Management
The Essentials | Privileged Access ManagementThe Essentials | Privileged Access Management
The Essentials | Privileged Access Management
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
Privleged Access Management
Privleged Access ManagementPrivleged Access Management
Privleged Access Management
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
Mark Fambrough Résumé
Mark Fambrough RésuméMark Fambrough Résumé
Mark Fambrough Résumé
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
User Profiling and Technology
User Profiling and TechnologyUser Profiling and Technology
User Profiling and Technology
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
 

More from Gluu

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
Gluu
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot award
Gluu
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiers
Gluu
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picks
Gluu
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc
Gluu
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
Gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
Gluu
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
Gluu
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
Gluu
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers ii
Gluu
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Gluu
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
Gluu
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
Gluu
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
Gluu
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
Gluu
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
Gluu
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
Gluu
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013
Gluu
 

More from Gluu (20)

Gluu server for educational institutions
Gluu server for educational institutionsGluu server for educational institutions
Gluu server for educational institutions
 
Pr from our recent nstic pilot award
Pr from our recent nstic pilot awardPr from our recent nstic pilot award
Pr from our recent nstic pilot award
 
The currency of identifiers
The currency of identifiersThe currency of identifiers
The currency of identifiers
 
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
 
Gluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picksGluu sxsw 2015 interactive picks
Gluu sxsw 2015 interactive picks
 
17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc17 recommended requirements for an identity and access management poc
17 recommended requirements for an identity and access management poc
 
First o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluuFirst o auth 2.0 and saml identity federation platform to be shown by gluu
First o auth 2.0 and saml identity federation platform to be shown by gluu
 
How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...How & why gluu’s open source authorization and authentication platform was ch...
How & why gluu’s open source authorization and authentication platform was ch...
 
East hackathon api’s for art
East hackathon api’s for artEast hackathon api’s for art
East hackathon api’s for art
 
Gluu’s vision
Gluu’s visionGluu’s vision
Gluu’s vision
 
Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...Gluu and canonical to demonstrate instant application security using ubuntu j...
Gluu and canonical to demonstrate instant application security using ubuntu j...
 
Currency of identifiers ii
Currency of identifiers iiCurrency of identifiers ii
Currency of identifiers ii
 
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...Shibboleth identity provider (idp) what it is, and why you should consider a ...
Shibboleth identity provider (idp) what it is, and why you should consider a ...
 
Federated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs oxFederated identity and open id connect why higher ed needs ox
Federated identity and open id connect why higher ed needs ox
 
Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0Web access management using o auth2 and saml – wam 2.0
Web access management using o auth2 and saml – wam 2.0
 
Packt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access managementPackt publishing book proposal api and mobile access management
Packt publishing book proposal api and mobile access management
 
Gluu oscon submission
Gluu oscon submissionGluu oscon submission
Gluu oscon submission
 
Go west young federation
Go west young federationGo west young federation
Go west young federation
 
 Use case for asimba as saml proxy
 Use case for asimba as saml proxy Use case for asimba as saml proxy
 Use case for asimba as saml proxy
 
Postcard from identity next 2013
Postcard from identity next 2013Postcard from identity next 2013
Postcard from identity next 2013
 

Recently uploaded

What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 

Recently uploaded (20)

What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 

Top 10 applications for multi factor authentication in higher education

  • 1. Strong, multi-factor authentication is one of the most cost efficient ways to reduce security threats within an organization. Although many organizations are hesitant to introduce strong authentication due to on-boarding and integration issues, we regularly advise existing and prospective customers to at the very least consider adding it to their developmental roadmaps. Watch how to use OX open source for strong, mutli-step, two-factor authentication. With the newest release of OX now available, implementing organization wide, strong authentication has never been more flexible. Not only is the OX platform vendor neutral, but it also supports multiple authentication providers if necessary and customizable business logic. So without further ado, here are the 10 +1 most common applications for Multi- Factor Authentication in Higher ED:
  • 2. 1. Privileged Access (“root”, “Admin,” “System,” or similar privileged access) to large or critical system: examples of such systems include campus ERP systems with financial data or student records; identity management systems; centralized backup systems; DNS servers; DHCP servers; campus web cache boxes, etc. Typical job titles of MFA user: system administrator, database administrator, DNS administrator 2. Core Network Devices: “Enable” access to core routers and similar privileged access to other key network devices (including firewalls and other network security appliances with traffic visibility) Typical job titles of MFA user: network engineer, network security engineer 3. Physical access to critical facilities [e.g., machine rooms, telecom switch rooms, colo facilities, other high value assets] Typical job titles of MFA user: facilities engineer, computer operator, etc.
  • 3. 4. Access to institutional financial accounts (commercial bank accounts, institutional brokerage access, etc.); note that this will typically use a credential specified by the bank, brokerage, etc., not by campus Typical job titles of MFA user: campus business officer, portfolio administrator, financial manager 5. Access to HIPAA covered health data (teaching hospital patient records, on campus health center records, testing center records, etc.) Typical job titles of MFA user: doctor, hospital/health center administrator, insurance billing specialist, etc. 6. Financial Aid data: because of the Department of Education special push in this area, Financial Aid administrators get a special call out (e.g., Department of Education is pushing 2FA hard tokens to all financial aid admins) 7. High Performance Computing Resources: many so-called supercomputer centers require 2FA after the unfortunate Stakato attacks. 8. VPN access from off campus (punching through a campus perimeter firewall, or accessing an especially sensitive internal network)
  • 4. 9. Campus Messaging (e.g., in an effort to preventing phishing and subsequent spam runs, resulting in widespread phishing) 10. Google (pushed by Google, rather than the campus) Plus one more (not strictly two factor, think more “alternative factor to traditional passwords”): Bonus: 11. Automated (machine-to-machine) connections (e.g., for things like scheduled bulk data transfers) [think Ssh pre-shared key access] Article resource:-http://gluu.soup.io/post/449514381/Top-10-Applications-for-Multi- Factor-Authentication