At SecureAuth, we are committed to providing world class strong authentication, with adaptive capabilities, in as many diverse integrations as possible. SecureAuth is dedicated to providing modern, well vetted, and easy to implement Software Development Kits (SDKs) for some of the largest programming languages in wide use at all organizations. With this mission in mind, I was offered the opportunity to help build an SDK for a modern language that we have fallen in love with at SecureAuth: Go (AKA: golang).
The need to strengthen enterprise authentication is almost universally acknowledged. Security professionals are quick to look at two-factor and multi-factor solutions to accomplish the goal; clearly, the addition of second and third factors addresses the need. However, there is a failure in the process to consider the value of the first factor in such solutions, the value of the password. In this Link, IDC examines the value of the password and its limited value in the future of enterprise network security.
The general consensus appears to be that two factor authentication is the answer to our authentication needs. Be that from usage of consumer sites in our personal lives or as part of our daily requirements when signing into enterprise infrastructure and applications at work.
It is refreshing to finally see a continued movement away from applications relying solely on usernames and passwords. This is a fantastic step in the right direction in protecting our own identity information from being misused.
Have you ever tried to get some critical work done, only to be challenged by the system to change your password? Have you ever been locked out because you can’t remember which of your passwords goes with which application? Have you ever succumbed to the temptation to write your passwords down, security policies be damned? And has ‘forgot my password’ become part of the login process for less frequently accessed sites and applications?
You’re not alone. There are even new names for what we’re all feeling, ranging from “password fatigue” all the way to “password rage.”
SecureAuth’s 25+ authentication methods range from SMS, telephony, and email onetime passwords (OTPs) to Symbol-to-Accept and USB keys, just to name a few. With our flexible authentication workflows, we adapt to you. You can easily create more stringent authentication workflows for those users with access to sensitive information, increasing access control security on any device - mobile or desktop.