background preloader

Identity

Facebook Twitter

S Internet Identity Research. Identity Toolkit - Google Code.

ID Assurance Potential participants

Oauth, OpenID, Facebook Connect: Authentication Design Best Practices. Home - SharePoint Live Authentication (Live ID and OpenID Trusted Identity Provider for Claims Based Authentication) Privacy and XML, Part I. April 17, 2002 Overview The widespread uptake of e-commerce has been stalled as much by the inability of businesses to guarantee the privacy preferences of their customers for the personal data entrusted to them as by any other single factor.

Of those who are connected but do not purchase online -- which is over half of all Internet users -- over half say their reluctance is due to fear that their personal information will be stolen or misused. In a sense, XML, through the smart data transfer it enables, contributes to the problem. However, a number of XML-based efforts are emerging that offer solutions to some of the major technology issues for privacy. Introduction Privacy, in the context of this article, may be understood as the ability of individuals to control the collection, use, and dissemination of personal information that is held by others. But businesses have always collected data about their customers. The emergence of mobile technologies. Privacy Issues/Concepts Privacy policy. Cyber-Ark's Privileged Identity Management for Cloud Computing. Trust, Identity and Access Management for the Cloud Operating System.

Cloud Identity Management Overview. Open source password manager gets two-factor authentication. Posted on 14 February 2012. Yubico announced a successful implementation of YubiKey two-factor authentication with the free, open source password manager software Password Safe. The joint solution offers Windows users an easy and affordable way to manage and secure their Internet passwords from their own computer. "The combination of Password Safe's proven Open Source approach to secure password management with Yubico's secure and elegant hardware authentication token provides users with the best of both worlds: independently verifiable two-factor security and ease-of use,” said Rony Shapiro, project manager for Password Safe. The YubiKey is a small, practically indestructible USB-token that simplifies the process of logging in with a secure One-Time Password (OTP). Two-factor SSH authentication via Google secures Linux logins. Vincent Danen details the steps of setting up Google two-factor authentication for SSH.

When Google introduced two-factor authentication for the Google and Google Apps accounts, they also created a pluggable authentication module (PAM) for Linux. This is great news for people running Linux servers who want to protect their remotely-accessible SSH accounts with two-factor authentication. For free. Two-factor authentication is where you authenticate to a service with two pieces of information: one you know, and one you don't. The information you know is your password (which can be stolen) while the information you don't know is a randomly-generated PIN number that changes every 60 seconds.

So even if your password is stolen or discovered, unless an attacker has the means to get the right PIN (tied to a hardware device), they cannot log into the protected service. $ sudo yum install pam-devel $ hg clone google-authenticator/ $ make token? Open Source Two-factor authentication: The WiKID Community Edition — Rhymes with Wicked. GrIDsure. GrIDsure was a personal identification system which extends the standard ‘shared-secret’ authentication model to create a secure methodology whereby a dynamic ‘one-time’ password or PIN can be generated by a user. It was invented by Jonathan Craymer and Stephen Howes in November 2005. It has received positive media reception.[1][2][3] GrIDsure went into liquidation in October 2011 after investor funding dried up.[4] On the 18th of November 2011 Cryptocard announced it has acquired the intellectual property of GrIDsure which includes 8 patents that have been granted and a further 16 pending.

Cryptocard was already a GrIDsure OEM partner and uses the product in their portfolio. Authentication method[edit] In order to authenticate, the user is asked to input a series of numbers based on a preregistered pattern on a grid (that the user knows) and a grid of pseudo-random numbers generated by the authenticator. Academic reception[edit] University College London conducted a usability trial. OAuth. For MediaWiki's (the software used by Wikipedia) OAuth support, see mw:Help:OAuth OAuth is an open standard for authorization, commonly used as a way for Internet users to log into third party websites using their Microsoft, Google, Facebook or Twitter accounts without exposing their password.[1] Generally, OAuth provides to clients a 'secure delegated access' to server resources on behalf of a resource owner.

It specifies a process for resource owners to authorize third-party access to their server resources without sharing their credentials. Designed specifically to work with Hypertext Transfer Protocol (HTTP), OAuth essentially allows access tokens to be issued to third-party clients by an authorization server, with the approval of the resource owner. The third party then uses the access token to access the protected resources hosted by the resource server.[2] OAuth is a service that is complementary to and distinct from OpenID. History[edit] OAuth 2.0[edit] Security[edit] Uses[edit] Security Assertion Markup Language. The single most important requirement that SAML addresses is web browser single sign-on (SSO). Single sign-on is common at the intranet level (using cookies, for example) but extending it beyond the intranet has been problematic and has led to the proliferation of non-interoperable proprietary technologies.

(Another more recent approach to addressing the browser SSO problem is the OpenID protocol.)[2] How SAML works[edit] The SAML specification defines three roles: the principal (typically a user), the identity provider (IdP), and the service provider (SP). In the use case addressed by SAML, the principal requests a service from the service provider. The service provider requests and obtains an identity assertion from the identity provider.

Before delivering the identity assertion to the SP, the IdP may request some information from the principal – such as a user name and password – in order to authenticate the principal. History of SAML[edit] Versions of SAML[edit] XML Schema (XSD) 1. 2. The OpenID Foundation. IdCommons. Identity management. In computing, identity management (IdM) describes the management of individual principals, their authentication, authorization,[1] and privileges within or across system and enterprise boundaries[2] with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks.[3] The terms "Identity Management" and "Identity and Access Management" (or IAM) are used interchangeably in the area of Identity access management, while identity management itself falls under the umbrella of IT Security.[4] Identity-management systems, products, applications and platforms manage identifying and ancillary data about entities that include individuals, computer-related hardware and applications.

Definitions[edit] Identity management (IdM) is the task of controlling information about users on computers. Digital identity is an entity's online presence, encompassing personal identifying information (PII) and ancillary information. Identity management functions[edit]