Buecker et al., 2012 - Google Patents
Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2Buecker et al., 2012
View HTML- Document ID
- 6369156110352957496
- Author
- Buecker A
- Patel N
- Rahnenfuehrer D
- Van Herzele J
- et al.
- Publication year
External Links
Snippet
Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that …
- 239000000243 solution 0 description 71
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11463444B2 (en) | Cloud-based privileged access management | |
| US11240109B2 (en) | Systems and methods for workspace continuity and remediation | |
| TWI794872B (en) | Information handling system, memory storage device and method for operating workspace | |
| US10462142B2 (en) | Techniques for implementing a data storage device as a security device for managing access to resources | |
| US11750609B2 (en) | Dynamic computing resource access authorization | |
| US11586738B2 (en) | Systems and methods for evaluating security risks using a manufacturer-signed software identification manifest | |
| CN108293045B (en) | Single sign-on identity management between local and remote systems | |
| JP6625636B2 (en) | Identity infrastructure as a service | |
| US11336655B2 (en) | Multilevel authorization of workspaces using certificates | |
| US20230325522A1 (en) | Systems and methods for securely deploying a collective workspace across multiple local management agents | |
| US11657126B2 (en) | Systems and methods for dynamic workspace targeting with crowdsourced user context | |
| Buecker et al. | Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2 | |
| CN107925659A (en) | Domain on no domain server adds virtual name | |
| CN108351927A (en) | Passwordless authentication for access management | |
| US20220353256A1 (en) | Usage-limited passcodes for authentication bootstrapping | |
| US20230153150A1 (en) | Systems and methods for migrating users and modifying workspace definitions of persona groups | |
| US20250021982A1 (en) | Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions | |
| WO2025075926A1 (en) | Dynamic control plane for configuring capabilities across applications via a cloud platform | |
| EP2795522B1 (en) | Techniques to store secret information for global data centers | |
| Ribeiro de Mello et al. | Multi-factor authentication for shibboleth identity providers | |
| US20180121670A1 (en) | Encryption management for storage devices | |
| Cabianca | Configuring Access | |
| Bicakci et al. | Towards zero trust: The design and implementation of a secure end-point device for remote working | |
| Zic et al. | Towards a cloud-based integrity measurement service | |
| Narayanan | Securing hadoop |