Anúncio
Anúncio

Mais conteúdo relacionado

Apresentações para você(20)

Anúncio

Similar a Authentication and strong authentication for Web Application(20)

Mais de Sylvain Maret(20)

Anúncio

Authentication and strong authentication for Web Application

  1. Sylvain Maret / Digital Security Expert @ MARET Consulting BrightTALK - October 7th 2010 Authentication and Strong Authentication in Web Application
  2. Protection of digital identities: a topical issue…
  3. threats on the authentication
  4. Definition of strong authentication Strong Authentication on Wikipedia
  5. «Digital identity is the cornerstone of trust» More information on the subject
  6. Strong Authentication A new paradigm !
  7. Which strong authentication technology? (Legacy Token …..)
  8.  
  9. * * Biometry type Fingerprinting OTP PKI (HW) Biometry Strong authentication Encryption Digital signature Non repudiation Strong link with the user
  10. Authentication Server must be agnostic
  11. New Standards & Open Source
  12. Integration with web application
  13. Web applications: basic authentication model
  14. Web application: strong authentication model
  15. “ Shielding" approach: perimetric authentication
  16. Module/Agent-based approach
  17. API/SDK based approach
  18. SSL PKI: how does it work? Web Server Alice Validation Authority Valid Invalid Unknown OCSP request SSL / TLS Mutual Authentication
  19. Federated identities: a changing paradigm on authentication
  20. Federation of identity approach a change of paradigm: using IDP for Authentication and Strong Authentication Web App X Web App Y Identity Provider
  21. Using SAML for Authentication and Strong Authentication (Assertion Consumer Service)
  22. SAML – How does it work? Identity Provider e.g. clavid.ch User Hans Muster Enabled Service e.g. Google Apps for Business 1 2 2 6 3 4 4
  23. Example with HTTP POST Binding
  24. SAML AuthN & ACS integration in Web Application
  25. OpenID - How does it work? 1 3 5 Enabled Service 6 4, 4a User Hans Muster Caption 1. User enters OpenID 2. Discovery 3. Authentication 4. Approval 4a. Change Attributes 5. Send Attributes 6. Validation 2 Identity URL https://hans.muster.clavid.com Identity Provider e.g. clavid.com hans.muster.clavid.com
  26. Architecture IPD Authentication Server
  27. Unique Interface Agnostic / Easy SAML
  28.  
  29. "Le conseil et l'expertise pour le choix et la mise en oeuvre des technologies innovantes dans la sécurité des systèmes d'information et de l'identité numérique"
  30.  
Anúncio