Analysis: How FIDO Alliance might change authentication

Two-Factor and Multifactor Authentication Strategies

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • privileged identity management (PIM)

    Privileged identity management (PIM) is the monitoring and protection of superuser accounts in an organization’s IT environments. Oversight is necessary so that the greater access abilities of super control accounts are not misused or abused. Unmanag... 

  • smart label

    A smart label is a slip of paper, plastic or other material on a product that contains an RFID tag in addition to bar code data. 

  • typeprint analysis

    Typeprint analysis is a technology in which the rhythmic patterns of a person's keyboard behavior, known as keystroke dynamics, are analyzed over a period of time and then stored... (Continue) 

  • authentication, authorization, and accounting (AAA)

    Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. 

  • password hardening

    Password hardening is any one of a variety of measures taken to make it more difficult for an intruder to circumvent the authentication process. Password hardening may take the form of multifactor authentication, by adding some component to the u... 

  • Kerberos

    Kerberos is a secure method for authenticating a request for a service in a computer network. 

  • federated identity management (FIM)

    Federated Identity Management (FIM) is an arrangement that can be made among multiple enterprises that lets subscribers use the same identification data to obtain access to the networks of all enterprises in the group... (Continued) 

  • authentication

    Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. 

  • AAA server (authentication, authorization, and accounting)

    An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.