SecureAuth IdP for AWS

SecureAuth IDP: Secure Access Control for Amazon Web Services
Author: 
SecureAuth

 

  SecureAuth IDP: Secure Access Control for AWS (Amazon Web Services)

SecureAuth IdP and Amazon Cognito

SecureAuth IdP AWS

 

SecureAuth Authenticates Trust between Mobile Developers and Amazon Cognito

Enterprises Can Now Easily Integrate their Exiting User Data Store for Secure Access to AWS-powered Apps and Services

HSPD-12 Access for Amazon Administrators

SecureAuth IdP for AWS has been through the STIG process and is pre-built for the enterprise to securely consume the U.S. federally approved credentials without requiring any coding.

SecureAuth API: Creating the Go SDK

Author: 
Jeff Hickman

 

Background

At SecureAuth, we are committed to providing world class strong authentication, with adaptive capabilities, in as many diverse integrations as possible. SecureAuth is dedicated to providing modern, well vetted, and easy to implement Software Development Kits (SDKs) for some of the largest programming languages in wide use at all organizations. With this mission in mind, I was offered the opportunity to help build an SDK for a modern language that we have fallen in love with at SecureAuth: Go (AKA: golang).

IDC Link: The Era of the Password Has Passed

The need to strengthen enterprise authentication is almost universally acknowledged. Security professionals are quick to look at two-factor and multi-factor solutions to accomplish the goal; clearly, the addition of second and third factors addresses the need. However, there is a failure in the process to consider the value of the first factor in such solutions, the value of the password. In this Link, IDC examines the value of the password and its limited value in the future of enterprise network security.

Is 2fA Enough?

Author: 
James Romer

The general consensus appears to be that two factor authentication is the answer to our authentication needs. Be that from usage of consumer sites in our personal lives or as part of our daily requirements when signing into enterprise infrastructure and applications at work.

It is refreshing to finally see a continued movement away from applications relying solely on usernames and passwords. This is a fantastic step in the right direction in protecting our own identity information from being misused.

Passwordless Authentication: Making the Dream a Reality

Author: 
Keith Graham

Have you ever tried to get some critical work done, only to be challenged by the system to change your password? Have you ever been locked out because you can’t remember which of your passwords goes with which application? Have you ever succumbed to the temptation to write your passwords down, security policies be damned? And has ‘forgot my password’ become part of the login process for less frequently accessed sites and applications?

You’re not alone. There are even new names for what we’re all feeling, ranging from “password fatigue” all the way to “password rage.”

Multi-Factor Authentication 25+ Methods Strong

SecureAuth’s 25+ authentication methods range from SMS, telephony, and email onetime passwords (OTPs) to Symbol-to-Accept and USB keys, just to name a few. With our flexible authentication workflows, we adapt to you. You can easily create more stringent authentication workflows for those users with access to sensitive information, increasing access control security on any device - mobile or desktop.

SecureAuth Launches New Capability Reducing Exploits for Mobile-Based Authentication

 

SecureAuth Launches New Capability Reducing Exploits for Mobile Multi-Factor Authentication

User-friendly Symbol-to-Accept mobile authentication solution provides same great user experience as Push-to-Accept, but is more secure.

 

Symbol-to-Accept: The Newest Innovation in Mobile-Based Authentication

Author: 
Damon Tepe

 

User-friendly Symbol-to-Accept provides the same great user experience as Push-to-Accept, while closing critical security gaps

 

Pages