[go: up one dir, main page]

Buecker et al., 2012 - Google Patents

Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2

Buecker et al., 2012

View HTML
Document ID
6369156110352957496
Author
Buecker A
Patel N
Rahnenfuehrer D
Van Herzele J
et al.
Publication year

External Links

Snippet

Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that …
Continue reading at books.google.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements

Similar Documents

Publication Publication Date Title
US11463444B2 (en) Cloud-based privileged access management
US11240109B2 (en) Systems and methods for workspace continuity and remediation
TWI794872B (en) Information handling system, memory storage device and method for operating workspace
US10462142B2 (en) Techniques for implementing a data storage device as a security device for managing access to resources
US11750609B2 (en) Dynamic computing resource access authorization
US11586738B2 (en) Systems and methods for evaluating security risks using a manufacturer-signed software identification manifest
CN108293045B (en) Single sign-on identity management between local and remote systems
JP6625636B2 (en) Identity infrastructure as a service
US11336655B2 (en) Multilevel authorization of workspaces using certificates
US20230325522A1 (en) Systems and methods for securely deploying a collective workspace across multiple local management agents
US11657126B2 (en) Systems and methods for dynamic workspace targeting with crowdsourced user context
Buecker et al. Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2
CN107925659A (en) Domain on no domain server adds virtual name
CN108351927A (en) Passwordless authentication for access management
US20220353256A1 (en) Usage-limited passcodes for authentication bootstrapping
US20230153150A1 (en) Systems and methods for migrating users and modifying workspace definitions of persona groups
US20250021982A1 (en) Digital ecosystem with de-centralized secure transactions and edge ai technology to enable privacy preserved zero-id transactions
WO2025075926A1 (en) Dynamic control plane for configuring capabilities across applications via a cloud platform
EP2795522B1 (en) Techniques to store secret information for global data centers
Ribeiro de Mello et al. Multi-factor authentication for shibboleth identity providers
US20180121670A1 (en) Encryption management for storage devices
Cabianca Configuring Access
Bicakci et al. Towards zero trust: The design and implementation of a secure end-point device for remote working
Zic et al. Towards a cloud-based integrity measurement service
Narayanan Securing hadoop