Tags: authentication

LDAP Authentication In Linux

This howto will show you how to store your users in LDAP and authenticate some of the services against it. I will not show how to install particular packages, as it is distribution/system dependent. I will focus on "pure" configuration of all components needed to have LDAP authentication/storage of...
Read 0 Comments

Yubico Launches New Lineup of Multifactor FIDO2 Security Keys

It’s an open secret that passwords aren’t the most effective way to protect online accounts. Alarmingly, three out of four people use duplicate passwords, and 21 percent of people use codes that are over 10 years old. (In 2014, among the five most popular passwords were “password,” “123456,” and “...
Read 0 Comments

Identity Management from the Cloud

Offers for identity management as a service (IDaaS) are entering the market and promising simplicity. However, many lack functionality, adaptability, and in-depth integration with existing systems. We look at how IT managers should consider IDaaS in their strategy. Identity and access management (...
Read 0 Comments

Usenet, Authentication, and Engineering (or: Early Design Decisions for Usenet)

A Twitter thread on trolls brought up mention of trolls on Usenet. The reason they were so hard to deal with, even then, has some lessons for today; besides, the history is interesting. (Aside: this is, I think, the first longish thing I've ever written about any of the early design decisions for...
Read 0 Comments

The HTTP Series (Part 4): Authentication Mechanisms

In the previous post, we’ve talked about the different ways that websites can use to identify the visiting user. But identification itself represents just a claim. When you identify yourself, you are claiming that you are someone. But there is no proof of that. Authentication, on the other hand, is...
Read 1 Comments

Two Factor Authentication – Best for the UNIX/Linux Server Security

The UNIX/Linux server security is challenging because these servers are at a risk of getting compromised at any point of time by the attackers. In today’s enterprise environment, the UNIX and Linux servers are growing popular. With their increased popularity, these servers have become the primary...
Read 0 Comments

Configure And Use Linux-PAM

In a previous post, we talked about Linux iptables firewall, and some people asked about authentication. Today we will talk about the powerful framework in Linux used for authentication which is Linux-PAM. PAM or Pluggable Authentication Modules are the management layer that sits between Linux...
Read 0 Comments

top-security-tutorials.jpg

security tutorials
Check out these top tutorials from Linux.com to help you improve your Linux server security.

Best Linux Server Security Tutorials on Linux.com

The first rule of Linux server security is to keep your server lean and mean. Only install the packages and run the services that you really need, writes Swapnil Bhartiya in his Linux.com tutorial on making your server more secure. “Even the most hardened servers can be hijacked by exploiting any...
Read 0 Comments

brian-spector-apachecon.png

Brian Spector
Brian Spector, MIRACL CEO and Co-Founder, described Apache Milagro -- a modern cryptosystem with distributed trust authorities -- at ApacheCon North America in May.

Apache Milagro: A New Security System for the Future of the Web

With 25 billion new devices set to hit the Internet by 2025, the need for a better worldwide cryptosystem for securing information is paramount. That’s why the Apache Milagro project is currently incubating at the Apache Software Foundation. It’s a collaboration between MIRACL and Nippon Telegram...
Read 0 Comments

SMS Two-Factor Authentication Is No Longer Enough

With the near-constant occurrence of highly organized and complex cybercrime attacks, effective digital authentication has never been more challenging. Businesses must verify who they’re transacting with by implementing additional security measures, but at the same time they need to minimize...
Read 0 Comments

Pages

Click Here!