Date post: | 31-Mar-2015 |
Category: |
Documents |
Upload: | virginia-denson |
View: | 308 times |
Download: | 12 times |
Single Sign-On(SSO)
Single Sign-On(SSO)
Strong Authentication
Single Sign-On(SSO)
Strong Authentication
KNOW *******
Single Sign-On(SSO)
Strong Authentication
KNOW *******
HAVE
Single Sign-On(SSO)
Strong Authentication
KNOW *******
HAVE
ARE
Single Sign-On(SSO)
Strong Authentication
KNOW *******
HAVE
Single Sign-On(SSO)
Strong Authentication
KNOW *******
HAVE
Overview
• Objectives• Protocol arquitecture and description• Prototype overview• Demo• Conclusion
André [email protected]
Objectives
• Strong Authentication protocol for SSO systems using the mobile phone as a security token– Security, usability, flexibility, cost-efficiency
André [email protected]
• Implmentation prototype– Proof-of-concept– Usable strong authentication method using the
mobile phone as an alternative in SSO authentication
Conclusion
André [email protected]
• SSO and strong authentication complement each other
• Mobile phone is a beneficial option as a security token and there are secure mechanisms that enhance it
• Protocol enables the creation of secure, usable, flexible and cost-efficient strong authentication methods
• Implementation prototype