By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
User Authentication Services News
September 29, 2016
Citing a long list of transgressions, Mozilla prepares to sanction Chinese certificate authority WoSign by removing it from its list of trusted certificate issuers.
June 30, 2016
Hospitals and healthcare organizations are far too vulnerable to cyberattacks, and a recent healthcare security study shows the issue isn't just outdated legacy technology -- medical professionals ...
May 26, 2016
Microsoft speeds deprecation of SHA-1, Google dropping support for RC4, SSLv3, as web software publishers approach end of life for obsolete cryptographic algorithms and protocols.
December 23, 2015
Increasing desire to be rid of SHA-1-signed certificates causes Google to join Microsoft, Mozilla in a likely acceleration of Chrome SHA-1 deprecation by six months.
User Authentication Services Get Started
Bring yourself up to speed with our introductory content
The best SSO today can handle the apps mobile workers use, identity as a service and more. Learn to make single sign-on, and other approaches, more effective. Continue Reading
The best SSO today can handle the apps mobile workers use, identity as a service and more. Learn to make single sign-on, and other identity management approaches, more effective. Continue Reading
It was inevitable that enterprise SSO would encounter the cloud. Learn how to adjust your company's approach to single sign-on so it keeps working well. Continue Reading
Evaluate User Authentication Services Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Security is critical in the cloud, so it isn't surprising that identity and access management services are in high demand. Learn why you need IAM, and what services to consider. Continue Reading
Companies have a lot at stake with IoT. A myriad of tools are emerging that provide the security features necessary to ensure connected enterprises don't get hacked. Continue Reading
There are various types of single sign-on technology that can be applied in any professional environment, including within healthcare facilities, to help authenticate users without requiring them to remember a multitude of different password and ... Continue Reading
Manage User Authentication Services
Learn to apply best practices and optimize your operations.
Federated identity management has clear security advantages. Learn ways to use Microsoft's AD FS and AWS AD Connector as identity and access management tools in the cloud. Continue Reading
In this SearchSecurity buyer's guide, learn how to evaluate and procure the right multifactor authentication product for your organization. Continue Reading
Mobile biometric authentication, including that technology on smartphones, has yet to be widely deployed. Expert Michele Chubirka explains why. Continue Reading
Problem Solve User Authentication Services Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Users often dismiss Outlook certificate errors, but admins should know better. Here are some steps to address the three common causes of certificate errors. Continue Reading
Attackers use compromised credentials to infiltrate enterprises undetected and steal corporate data. Expert Nick Lewis offers the best ways to handle this threat. Continue Reading
ICloud Keychain can supposedly sync passwords across devices without using iCloud. But is it secure? Security expert Michele Chubirka explains. Continue Reading