Learn how Tozny uses passwords, Libsodium, and elliptic curves to power secure authentication for InnoVault’s new Admin Console.
As secure as your platform might be, chances are high that your users are using the same password for your system as they are for another site or service. Why use passwords at all?
Our most recent series has detailed what’s involved in building and configuring your own centralized authentication service built atop the open source SimpleSAMLphp project.
This week we’ll modify our SimpleSAMLphp server to act as a hosted identity provider for Google’s G-Suite.
This week we’ll modify our SimpleSAMLphp server to act as a hosted identity provider for Microsoft’s Office 365 productivity suite.
This week we’ll modify our SimpleSAMLphp server to leverage Tozny’s secure, password-free authentication platform for identity verification.
As part of an ongoing series, we’re helping to explain ways to configure SimpleSAMLphp as a centralized identity provider (IDP) for your organization.
14% of Worldwide Internet Users Were Exposed I’m sure if you are reading this, you are already aware of the historic Yahoo data breach that was announced last week. 500 million accounts affected – the largest number of accounts ever affected by a known breach. Let’s put that into perspective – according to the US Census Population Clock, the current population …
NIST has gotten a lot of attention lately because they pointed out that SMS is less secure than many people think, and if you’re trying to shore up passwords with a second login method, you should probably consider using something that’s more secure. This type of “shoring up” of passwords is called two factor authentication, or 2FA for short. People use …
In my previous blog, I briefly touched on the fact that many Internet of Things (IoT) devices today have defaulted to the lowest common denominator for security and authentication: passwords. IoT devices — particularly mobile devices — introduce security and privacy risks because most have a limited user interface that can only handle short, easy-to-crack passwords. The proliferation of mobile and …
- Page 1 of 2