Posted by:
admin
12 years, 1 month ago
Needless to say we're big proponents of two-factor authentication around here. We also have a pretty broad spectrum of customers from large service providers pushing two-factor authentication out to customer to small businesses doing security for the first time thanks/due to PCI requirements. A lot of infosec rock stars talk about how PCI should be a floor and without disagreeing, we first hand see companies reaching that floor, called by some the 'information security poverty line' and know that it is a big improvement.
One of the key ways we know whether a company is really trying or not is how they configure their two-factor authentication in their network. PCI regulations can be met by having your VPN talk directly to the two-factor authentication server. This configuration is quite easy if you use radius.
It takes more effort up front to have the VPN concentrator talk to your directory and have the directory perform authorization and then proxy the authentication request to the WiKID Strong Authentication server. However, the security benefits of this setup are clear. It is much easier to deprovision users and to have role changes reflected immediately. Long term, it's also less work and more flexible.
While recently review our web analytics I was interested to see that our top instructional content piece over the last 90 days is "How to add two-factor authentication to NPS". The next most popular is our tutorial on "PAM radius for Ubuntu", followed by "How to add two-factor authentication to OpenLDAP & Freeradius". Lees popular, but still higher than most of our VPN tutorials is "How to Configure IAS to Support Two-factor authentication".
So two of our top three tutorials of late are about setting up two-factor authentication correctly. Of course, you can argue that almost everyone that has a directory is using AD or OpenLDAP, where as we have a tutorial for all the major VPN providers (Cisco, Juniper, Sonicwall, etc. etc.) but I choose to see it as heading in the right direction. (Of course, if I weren't an uber-optimist I would have a real job instead of being
In addition, these numbers do not include the downloads for our eGuide on Adding Two-factor Authentication to your Network, which of course stresses the inclusion of your directory, with NPS as an example.
Share on Twitter Share on FacebookRecent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)