SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Understanding PortalGuard’s


      Two-factor Authentication:
        A Tokenless Approach




Highlighting the Multi-factor Authentication Layer of the
                 PortalGuard Platform
By the end of this tutorial you will be able to…

 • Define PortalGuard
 • Understand the need for two-factor authentication
 • Learn about PortalGuard’s Two-factor Authentication Options
 • See the step-by-step Authentication Process
 • Know the technical requirements
The PortalGuard software is a Contextual Authentication platform
   which is focused on enhancing usability, while maintaining a
 balance between security, auditing and compliance for your web,
                 desktop and mobile applications.

   Usability                       Security
   • Single Sign-on                • Knowledge-based
   • Password Management           • Two-factor Authentication
   • Password Synchronization      • Contextual Authentication
   • Self-service Password Reset   • Real-time Reports/Alerts
Before going into the details…


• Configurable by user, group or application
• Configure One-time Password (OTP) length, expiration and format
• Send OTP via SMS, email, transparent token and printer
• Enforced for direct access to applications, VPN using RADIUS and during
  a self-service password reset, recovery, or account unlock
• No SMS gateway required
• Cost effective and competitively priced
• Tailored Authentication for an exact fit
A P P L I C AT I O N S
Two-factor Authentication is…
   Used to increase security by requiring:


“Something you know”

                          AND
                                    “Something you have”
Aren’t all Two-factor Authentication Solutions the Same?
They will increase your security however…

   • Inflexible
   • Low usability
   • High total cost of ownership
   • Tokens are expensive, forgotten and need replacement/repair
ONE-TIME PASSWORD (OTP)




• Web/cloud application directly
• VPN connection using RADIUS
• Self-service password reset,
  recovery, or account unlock      Transparent Tokens
How do I choose?

         • Attack Prevention – both passive and active
SMS

         • Total Cost of Ownership

         • Support/Maintenance Requirements

         • Client-side Software
         • Ease of Use
         • Portability
• Increased security - add an extra layer of authentication to application
  access, VPN access, or during a self-service password reset
• Reduce Risk - prevent attacks by leveraging credentials which expire
  after one use
• Usability - leverage hardware a user already has for increased user
  adoption
• Eliminate forgotten passwords - leverage a username and OTP only as
  credentials
• Configurable - to the user, group or application levels
• Flexible - multiple OTP delivery methods available
HOW IT WORKS
PortalGuard provides flexibility…

Allows you to configure whether the enrollment will be forced or able to
be postponed “x” number of times by the user.
Step 1:
      7:
      6:
      5:
      4:
      3:
      2:
PortalGuard’s loginin thetosends the OTP tocontinue. expired web-application.
  The user entersaccessaOTP they received and and data. On”. that was
  This PortalGuard screen user attempting toauseclicks “Log OTP
  The user enterstheir username and clicks the user’s mobile phone
       is angains server isthe web-application an
            example of       presented when user visits the
  The user is prompted for a password and OTP.
  never 5-10 Once the expired OTP an SMS.
  withinused. seconds, in the form ofis entered, the user is denied access
  and prompted to cancel the process or request a valid OTP.
Step 1:
PortalGuard’s login screen is presented when a user visits the web-application.
Step 2:
The user enters their username and clicks continue.
Step 3:
The PortalGuard server sends the OTP to the user’s mobile phone
within 5-10 seconds, in the form of an SMS.
Step 4:
The user is prompted for a password and OTP.
Step 5:
The user enters in the OTP they received and clicks “Log On”.
Step 6:
The user gains access to the web-application and data.
Step 6:
This is an example of a user attempting to use an expired OTP that was
never used. Once the expired OTP is entered, the user is denied access
and prompted to cancel the process or request a valid OTP.
RADIUS Support:
An internet standard that was designed primarily to authenticate
remote users
               •   Cisco            •   Citrix
               •   Juniper          •   Checkpoint


           Network Access Server (NAS) = “RADIUS Client”
                      PortalGuard = “RADIUS Server”

•   User accounts defined locally
•   LDAP Authentication
•   X.509 certificates
•   RADIUS
Step 1:
The user attempts to connect to the NAS/firewall using either a
browser or VPN client software and is prompted for username and
password.
Step 2:
The NAS communicates the credentials to the PortalGuard server
using the RADIUS protocol.

Step 3:

The PortalGuard server validates the user’s credentials against its
configured user repository (e.g. Active Directory).
Step 4:
The user attempts to connect to the NAS/firewall using either a
browser or VPN client software and is prompted for username and
password.
 Step 5:
PortalGuard replies to the RADIUS request with an Access-Challenge
response that includes a custom message that should be displayed to
the user and a random identifier (the “state”) that the NAS will send
back to PortalGuard to identify the same user session.
Step 6:
The NAS displays the custom message requesting the user to enter
the OTP that was sent to their mobile device.
Step 7:
The user enters the OTP from their mobile device and submits
it to the NAS.
Step 8:
 The NAS communicates the credentials to the PortalGuard server
 using the RADIUS protocol.

 Step 9:
The PortalGuard server replies to the RADIUS 2nd request with an
Access-Accept response.
Step 10:
The NAS accepts the user’s authentication and the VPN
tunnel/session is established. The user is then able to access
internal resources (e.g. “crm.acme.com”).
Configurable through the PortalGuard Configuration Utility:
• Delivery format, including From, Subject and Body fields
• Expiration, aka “time-to-
  live” (TTL)
• Length
• Format
    • Numeric characters only
    • Upper/lowercase
      characters
    • Upper/lowercase &
      numeric characters
    • Upper/lowercase,
      numeric and symbol
      characters
TECHNICAL REQUIREMENTS
A MSI is used to install PortalGuard on IIS 6 or 7.x.
    This version of PortalGuard supports direct access and authentication
    to cloud/browser-based applications, only.
• .NET 2.0 framework or later must be installed
• (64-bit OS only) Microsoft Visual C++ 2005 SP1 Redistributable Package (x64)
• IBM WebSphere/WebSphere Portal v5.1 or higher
• Microsoft IIS 6.0 or higher
• Microsoft Windows SharePoint Services 3.0 or higher
• Microsoft Office SharePoint Server 2007 or later
• Microsoft Windows Server 2000
• Microsoft Windows Server 2003 (32 or 64-bit)
• Microsoft Windows Server 2008 (32 or 64-bit)
• Microsoft Windows Server 2008 R2
• The network appliance must support RADIUS as an authentication option
• The network appliance must support the Access-Challenge response type as well as
  the State and Reply-Message attributes
• PortalGuard must be licensed for RADIUS support
• End-user enrollment of mobile devices or challenge answers must be performed
  external to the RADIUS protocol
THANK YOU
For more information visit PortalGuard.com or Contact Us

Contenu connexe

Tendances

Two Factor Authentication Made Easy ICWE 2015
Two Factor Authentication Made Easy  ICWE 2015Two Factor Authentication Made Easy  ICWE 2015
Two Factor Authentication Made Easy ICWE 2015Alex Q. Chen
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesIBM Security
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?Fortytwo
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authenticationHai Nguyen
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor AuthenticationNikhil Shaw
 
SecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionSecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionRafidah Ariffin
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSonionid12
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.SecureAuth
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsRamesh Nagappan
 
Securing Microservices with Spring Cloud Security
Securing Microservices with Spring Cloud SecuritySecuring Microservices with Spring Cloud Security
Securing Microservices with Spring Cloud SecurityWill Tran
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSRapidSSLOnline.com
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Alliance
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...Sagara Gunathunga
 
Code by the sea: Web Application Security
Code by the sea: Web Application SecurityCode by the sea: Web Application Security
Code by the sea: Web Application SecurityBoy Baukema
 

Tendances (20)

Two Factor Authentication Made Easy ICWE 2015
Two Factor Authentication Made Easy  ICWE 2015Two Factor Authentication Made Easy  ICWE 2015
Two Factor Authentication Made Easy ICWE 2015
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
SecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionSecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password Solution
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.Webinar: Goodbye RSA. Hello Modern Authentication.
Webinar: Goodbye RSA. Hello Modern Authentication.
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
Securing Microservices with Spring Cloud Security
Securing Microservices with Spring Cloud SecuritySecuring Microservices with Spring Cloud Security
Securing Microservices with Spring Cloud Security
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
Auth-Shield
Auth-ShieldAuth-Shield
Auth-Shield
 
STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDS
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...
 
Code by the sea: Web Application Security
Code by the sea: Web Application SecurityCode by the sea: Web Application Security
Code by the sea: Web Application Security
 

En vedette

9 password security
9   password security9   password security
9 password securitydrewz lin
 
Two factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorTwo factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorAllan Denot
 
2FA Protocol Presentation
2FA Protocol Presentation2FA Protocol Presentation
2FA Protocol PresentationAkhil Agrawal
 
Secure Session Control in Education Cloud Using One Time Password (OTP)
Secure Session Control in Education Cloud Using One Time Password (OTP)Secure Session Control in Education Cloud Using One Time Password (OTP)
Secure Session Control in Education Cloud Using One Time Password (OTP)Edel Rajakumari
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of soundVikram Verma
 
Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captchakunalkiit
 
Uml diagram for_hospital_management_system
Uml diagram for_hospital_management_systemUml diagram for_hospital_management_system
Uml diagram for_hospital_management_systemPradeep Bhosale
 
Hospital management system
Hospital management systemHospital management system
Hospital management systemsubu
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsHari Krishnan
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management SystemPranil Dukare
 
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4NICHOLAS RATEMO
 
Hospital management system project
Hospital management system projectHospital management system project
Hospital management system projectHimani Chopra
 

En vedette (16)

9 password security
9   password security9   password security
9 password security
 
Two factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorTwo factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google Authenticator
 
2FA Protocol Presentation
2FA Protocol Presentation2FA Protocol Presentation
2FA Protocol Presentation
 
Secure Session Control in Education Cloud Using One Time Password (OTP)
Secure Session Control in Education Cloud Using One Time Password (OTP)Secure Session Control in Education Cloud Using One Time Password (OTP)
Secure Session Control in Education Cloud Using One Time Password (OTP)
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
captcha as a graphical password
captcha as a graphical passwordcaptcha as a graphical password
captcha as a graphical password
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 
Graphical password authentication system with association of sound
Graphical password authentication system with association of soundGraphical password authentication system with association of sound
Graphical password authentication system with association of sound
 
Seminar report on captcha
Seminar report on captchaSeminar report on captcha
Seminar report on captcha
 
Uml diagram for_hospital_management_system
Uml diagram for_hospital_management_systemUml diagram for_hospital_management_system
Uml diagram for_hospital_management_system
 
Hospital management system
Hospital management systemHospital management system
Hospital management system
 
Ppt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click pointsPpt for graphical password authentication using cued click points
Ppt for graphical password authentication using cued click points
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
PROJECT-HOSPITAL MANAGEMENT SYSTEM CHAP. 1 TO 4
 
Hospital management system project
Hospital management system projectHospital management system project
Hospital management system project
 
Hospital management system
Hospital management systemHospital management system
Hospital management system
 

Similaire à Two-factor Authentication

Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Hai Nguyen
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SASrobbuddingh
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Accessbluntm64
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewNick Owen
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxgilpinleeanna
 
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSAWS User Group Kochi
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
An Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldAn Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldVMware Tanzu
 
Rsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentationRsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentationZeev Shetach
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iPrecisely
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CJoonas Westlin
 
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)Artur Barseghyan
 

Similaire à Two-factor Authentication (20)

Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01Twofactorauthentication 120625115723-phpapp01
Twofactorauthentication 120625115723-phpapp01
 
Context Based Authentication
Context Based AuthenticationContext Based Authentication
Context Based Authentication
 
Self-service Password Reset
Self-service Password ResetSelf-service Password Reset
Self-service Password Reset
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 
Password Synchronization
Password SynchronizationPassword Synchronization
Password Synchronization
 
Digital Certificates and Secure Web Access
Digital Certificates and Secure Web AccessDigital Certificates and Secure Web Access
Digital Certificates and Secure Web Access
 
Password management
Password managementPassword management
Password management
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems Overview
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
WebAuthn & FIDO2
WebAuthn & FIDO2WebAuthn & FIDO2
WebAuthn & FIDO2
 
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
 
Presentation
PresentationPresentation
Presentation
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
An Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices WorldAn Authentication and Authorization Architecture for a Microservices World
An Authentication and Authorization Architecture for a Microservices World
 
Rsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentationRsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentation
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Security 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM iSecurity 101: Multi-Factor Authentication for IBM i
Security 101: Multi-Factor Authentication for IBM i
 
Introduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2CIntroduction to Azure AD and Azure AD B2C
Introduction to Azure AD and Azure AD B2C
 
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 

Plus de PortalGuard dba PistolStar, Inc. (6)

The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
The Cost and Loss of Not using Single Sign-On with Two-Factor AuthenticationThe Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
The Cost and Loss of Not using Single Sign-On with Two-Factor Authentication
 
Password Management
Password ManagementPassword Management
Password Management
 
Password Synchronization
Password SynchronizationPassword Synchronization
Password Synchronization
 
Self-service Password Reset
Self-service Password ResetSelf-service Password Reset
Self-service Password Reset
 
Contextual Authentication
Contextual AuthenticationContextual Authentication
Contextual Authentication
 
Make Your Employees More Security Aware
Make Your Employees More Security AwareMake Your Employees More Security Aware
Make Your Employees More Security Aware
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Two-factor Authentication

  • 1. Understanding PortalGuard’s Two-factor Authentication: A Tokenless Approach Highlighting the Multi-factor Authentication Layer of the PortalGuard Platform
  • 2. By the end of this tutorial you will be able to… • Define PortalGuard • Understand the need for two-factor authentication • Learn about PortalGuard’s Two-factor Authentication Options • See the step-by-step Authentication Process • Know the technical requirements
  • 3. The PortalGuard software is a Contextual Authentication platform which is focused on enhancing usability, while maintaining a balance between security, auditing and compliance for your web, desktop and mobile applications. Usability Security • Single Sign-on • Knowledge-based • Password Management • Two-factor Authentication • Password Synchronization • Contextual Authentication • Self-service Password Reset • Real-time Reports/Alerts
  • 4. Before going into the details… • Configurable by user, group or application • Configure One-time Password (OTP) length, expiration and format • Send OTP via SMS, email, transparent token and printer • Enforced for direct access to applications, VPN using RADIUS and during a self-service password reset, recovery, or account unlock • No SMS gateway required • Cost effective and competitively priced • Tailored Authentication for an exact fit
  • 5. A P P L I C AT I O N S
  • 6. Two-factor Authentication is… Used to increase security by requiring: “Something you know” AND “Something you have”
  • 7. Aren’t all Two-factor Authentication Solutions the Same? They will increase your security however… • Inflexible • Low usability • High total cost of ownership • Tokens are expensive, forgotten and need replacement/repair
  • 8. ONE-TIME PASSWORD (OTP) • Web/cloud application directly • VPN connection using RADIUS • Self-service password reset, recovery, or account unlock Transparent Tokens
  • 9. How do I choose? • Attack Prevention – both passive and active SMS • Total Cost of Ownership • Support/Maintenance Requirements • Client-side Software • Ease of Use • Portability
  • 10. • Increased security - add an extra layer of authentication to application access, VPN access, or during a self-service password reset • Reduce Risk - prevent attacks by leveraging credentials which expire after one use • Usability - leverage hardware a user already has for increased user adoption • Eliminate forgotten passwords - leverage a username and OTP only as credentials • Configurable - to the user, group or application levels • Flexible - multiple OTP delivery methods available
  • 12. PortalGuard provides flexibility… Allows you to configure whether the enrollment will be forced or able to be postponed “x” number of times by the user.
  • 13. Step 1: 7: 6: 5: 4: 3: 2: PortalGuard’s loginin thetosends the OTP tocontinue. expired web-application. The user entersaccessaOTP they received and and data. On”. that was This PortalGuard screen user attempting toauseclicks “Log OTP The user enterstheir username and clicks the user’s mobile phone is angains server isthe web-application an example of presented when user visits the The user is prompted for a password and OTP. never 5-10 Once the expired OTP an SMS. withinused. seconds, in the form ofis entered, the user is denied access and prompted to cancel the process or request a valid OTP.
  • 14. Step 1: PortalGuard’s login screen is presented when a user visits the web-application.
  • 15. Step 2: The user enters their username and clicks continue.
  • 16. Step 3: The PortalGuard server sends the OTP to the user’s mobile phone within 5-10 seconds, in the form of an SMS.
  • 17. Step 4: The user is prompted for a password and OTP.
  • 18. Step 5: The user enters in the OTP they received and clicks “Log On”.
  • 19. Step 6: The user gains access to the web-application and data.
  • 20. Step 6: This is an example of a user attempting to use an expired OTP that was never used. Once the expired OTP is entered, the user is denied access and prompted to cancel the process or request a valid OTP.
  • 21. RADIUS Support: An internet standard that was designed primarily to authenticate remote users • Cisco • Citrix • Juniper • Checkpoint Network Access Server (NAS) = “RADIUS Client” PortalGuard = “RADIUS Server” • User accounts defined locally • LDAP Authentication • X.509 certificates • RADIUS
  • 22. Step 1: The user attempts to connect to the NAS/firewall using either a browser or VPN client software and is prompted for username and password.
  • 23. Step 2: The NAS communicates the credentials to the PortalGuard server using the RADIUS protocol. Step 3: The PortalGuard server validates the user’s credentials against its configured user repository (e.g. Active Directory).
  • 24. Step 4: The user attempts to connect to the NAS/firewall using either a browser or VPN client software and is prompted for username and password. Step 5: PortalGuard replies to the RADIUS request with an Access-Challenge response that includes a custom message that should be displayed to the user and a random identifier (the “state”) that the NAS will send back to PortalGuard to identify the same user session.
  • 25. Step 6: The NAS displays the custom message requesting the user to enter the OTP that was sent to their mobile device.
  • 26. Step 7: The user enters the OTP from their mobile device and submits it to the NAS.
  • 27. Step 8: The NAS communicates the credentials to the PortalGuard server using the RADIUS protocol. Step 9: The PortalGuard server replies to the RADIUS 2nd request with an Access-Accept response.
  • 28. Step 10: The NAS accepts the user’s authentication and the VPN tunnel/session is established. The user is then able to access internal resources (e.g. “crm.acme.com”).
  • 29. Configurable through the PortalGuard Configuration Utility: • Delivery format, including From, Subject and Body fields • Expiration, aka “time-to- live” (TTL) • Length • Format • Numeric characters only • Upper/lowercase characters • Upper/lowercase & numeric characters • Upper/lowercase, numeric and symbol characters
  • 31. A MSI is used to install PortalGuard on IIS 6 or 7.x. This version of PortalGuard supports direct access and authentication to cloud/browser-based applications, only. • .NET 2.0 framework or later must be installed • (64-bit OS only) Microsoft Visual C++ 2005 SP1 Redistributable Package (x64) • IBM WebSphere/WebSphere Portal v5.1 or higher • Microsoft IIS 6.0 or higher • Microsoft Windows SharePoint Services 3.0 or higher • Microsoft Office SharePoint Server 2007 or later • Microsoft Windows Server 2000 • Microsoft Windows Server 2003 (32 or 64-bit) • Microsoft Windows Server 2008 (32 or 64-bit) • Microsoft Windows Server 2008 R2 • The network appliance must support RADIUS as an authentication option • The network appliance must support the Access-Challenge response type as well as the State and Reply-Message attributes • PortalGuard must be licensed for RADIUS support • End-user enrollment of mobile devices or challenge answers must be performed external to the RADIUS protocol
  • 32. THANK YOU For more information visit PortalGuard.com or Contact Us