Single Sign-On (SSO) Single Sign-On (SSO) Strong Authentication.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Advertisements

FAME-PERMIS Project University of Manchester University of Kent London, July 2006.
Mobile Devices in the DoD
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
McAfee One Time Password
The quest to replace passwords Evangelos Markatos Based on a paper by Joseph Bonneau,Cormac Herley, Paul C. van Oorschot, and Frank Stajanod.
An Analysis of the Alternatives to Traditional Static Alphanumeric Passwords Mahmoud Abaza and Brent Hunter School of Computing and Information Systems,
Mobile phone development. Overview of presentation Key drivers in the mobile industry Mobile as a business tool Emerging mobile technologies Conclusions.
AAI for Apps Using AAI with your Smartphone Daniel Latzer Zürich, April 2013
A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
Altman IM Ltd | | capture | convert | route | connect | workflow ScanPath provides enhanced scanning & document processing.
IPassConnect 3.50 Overview July Overview Available August 3, 2006 through support ticket Operating System Support Windows 2000 Windows XP Languages.
SSIA SUMMIT October 2014 Advanced Bridging Technologies Hold Key to Finally Making Smart Homes a Reality Fred Dart – FTDI Chip.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Kerberos Network Authentication Protocol A Team 1 Presentation: Les Beckford Joe DeCicco Vera Rhoads Than Lam Steve Parshley DCS835 June 24, 2000.
Mobile Single Sign On System Souheil Lazghab. The security protocol should secure: First, the Bluetooth communication between the PICDEM FS USB Demo board.
© 2009 Cisco Systems, Inc. All rights reserved. ROUTE v1.0—6-1 Connecting an Enterprise Network to an ISP Network References to IPv6 and Remote Access.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Wireless Grid Computing A Prototype Wireless Grid Grant Gifford Mark Hempstead April 30, 2003.
Towards A User-Centric Identity-Usage Monitoring System - ICIMP Daisuke Mashima and Mustaque Ahamad College of Computing Georgia Institute of Technology.
Presenters :Deepak Yadav Voice Over Internet Protocol.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
ASP. Net is a rich web framework that leverages well known patterns and JavaScript frameworks to build great web experiences quickly.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Single sign-on Secure password store Mats Byfuglien.
Using Enterprise Logins in Portal for ArcGIS via SAML Greg Ponto & Tom Shippee.
WP6: Static Analysis Presented by Flemming Nielson Informatics and Mathematical Modelling Technical University of Denmark at the 3nd review of DEGAS in.
1 Using GSM/UMTS for Single Sign-On 28 th October 2003 SympoTIC 2003 Andreas Pashalidis and Chris J. Mitchell.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
SSO Case Study Suchin Rengan Principal Technical Architect Salesforce.com.
Existing Alternative for Pushing Content to Mobile Devices – an Analysis and an Implementation Diplomityöseminaari Marcus Mattila 49836w.
Joe Mandala, KBI CIO. Phase 1 – Network/Application Integration Solution assessment and deployment, IAM discovery (complete) Phase 2/3.1 – IAM Selection.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Adxstudio Portals Training
CMSC Presentation An End-to-End Approach to Host Mobility An End-to-End Approach to Host Mobility Alex C. Snoeren and Hari Balakrishnan Alex C. Snoeren.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Duo UI Demo Christopher Bongaarts. CONTEXT/MOTIVATION Two-factor auth already in use –“M Key” – Safeword Silver tokens, Safeword PremierAccess software.
LOGO Cloud Storage Oriented Cipher-text Search Protocol.
HOTP IETF Draft David M’Raihi IETF Meeting - March 10, 2005.
Project Undertaken By, Anita.K Subalakshmi.S Suseela.J.S Guide: Mrs.M.J.Jeyasheela Rakkini AP/CSE Third Review.
Framework for Collecting, Reporting, & Sharing Senior Design III - Spring 2007 Louis Von Eye.
2 Why Nelnet? 3 Nelnet Business Solutions Overview 770 institutions; 27 years of processing payments Security / compliance Comprehensive suite of services.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Unity Connection 2.0 Co-resident Administration Overview Cary A. Bran.
Mobile PKI ● Demo ● Overview / Terminology ● Use cases ● Trust ● Costs ● Feedback.
Understand User Authentication LESSON 2.1A Security Fundamentals.
A National e-Authentication Service
INF385G: Topic Discussion Huang, S. C.
SAML New Features and Standardization Status
Implementation of Wi-Fi in 5 Points Realty
Azure AD for the client management guy (or gal!)
Phone: + 40 (728) | +40 (733)
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Compact Framework Directional Interface
A mobile single sign-on system
CIS 210 Systems Analysis and Development
ACS Functionality.
Public Key Infrastructure from the Most Trusted Name in e-Security
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Strong Password Authentication Protocols
FARA: Reorganizing the Addressing Architecture
Device Registration and Multi-Factor Authentication
Interface Design- Wireframes
OpenID Enhanced Authentication Profile (EAP) Working Group
Presentation transcript:

Single Sign-On (SSO)

Single Sign-On (SSO) Strong Authentication

Single Sign-On (SSO) Strong Authentication KNOW *******

Single Sign-On (SSO) Strong Authentication KNOW ******* HAVE

Single Sign-On (SSO) Strong Authentication KNOW ******* HAVE ARE

Single Sign-On (SSO) Strong Authentication KNOW ******* HAVE

Single Sign-On (SSO) Strong Authentication KNOW ******* HAVE

Strong Mobile Authentication in Single Sign-On Systems André Andrade

Overview Objectives Protocol arquitecture and description Prototype overview Demo Conclusion André Andrade

Objectives Strong Authentication protocol for SSO systems using the mobile phone as a security token – Security, usability, flexibility, cost-efficiency André Andrade Implmentation prototype – Proof-of-concept – Usable strong authentication method using the mobile phone as an alternative in SSO authentication

Protocol - Arquitecture André Andrade

Protocol - Arquitecture André Andrade

Protocol - Description André Andrade

Prototype - Overview André Andrade

Prototype - Demo André Andrade

Conclusion André Andrade SSO and strong authentication complement each other Mobile phone is a beneficial option as a security token and there are secure mechanisms that enhance it Protocol enables the creation of secure, usable, flexible and cost-efficient strong authentication methods Implementation prototype

André Andrade Questions?