New & Notable
Web Authentication and Access Control News
June 05, 2014
Despite the popularity of SAML, the mobile and cloud benefits of OpenID Connect may spur adoption as an enterprise authentication platform.
December 15, 2011
Following a breach to a GlobalSign Web server, an extensive investigation found no evidence of an infiltration of its digital certificate infrastructure and no leakage of its certificate keys.
June 07, 2011
Following a retooling of its manufacturing and supply chain management processes, RSA plans to replace security tokens for high risk customers.
August 30, 2010
CA said Arcot's software as a service delivery model could help accelerate its delivery of CA identity and access management technologies from the cloud.
Web Authentication and Access Control Get Started
Bring yourself up to speed with our introductory content
Multifactor authentication (MFA) is a security system that requires more than one form of authentication to verify the legitimacy of a transaction. MFA combines two or more independent credentials: what the user knows (password), what the user has (... Continue Reading
BYOI (bring your own identity) is an approach to digital authentication in which an end user's username and password is managed by a third party such as Facebook, Twitter, LinkedIn, Google+ or Amazon. Continue Reading
An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure standard to verify that a public key belongs to the user, computer or service identity contained within the certificate. Continue Reading
Evaluate Web Authentication and Access Control Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Michael Cobb explores the pros and cons of authentication caching and whether the practice can truly calm network strain. Continue Reading
Threats expert Nick Lewis explores whether Google's Transparency Report can be used to enhance blacklisting of malicious websites in the enterprise. Continue Reading
Explore the differences between consumer and enterprise password management products and learn pros and cons about the latest tools. Continue Reading
Manage Web Authentication and Access Control
Learn to apply best practices and optimize your operations.
How can we best prevent hacking and user account lock out in Web applications with forms-based authentication? Continue Reading
The recent Django authentication flaw highlights the importance of testing for authentication vulnerabilities. Michele Chubirka explains how. Continue Reading
Errors are bound to occur when SSL certificate management is handled manually. Learn how to avoid these common mistakes. Continue Reading
Problem Solve Web Authentication and Access Control Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Malware leveraging PKI and digital signatures is increasingly common. Nick Lewis explains the threat and five key defense strategies. Continue Reading
Enterprise use of adaptive authentication is growing internally and for Web applications. Brad Causey details the allure of risk-based authentication. Continue Reading
Leading browsers are required to use 2,048-bit length keys by the end of the year, but what effect does this have on security? Michael Cobb discusses. Continue Reading