Active Directory Federation Services (ADFS) is a Single Sign-On (SSO) solution created by Microsoft. As a component of Windows Server operating systems, it provides users with authenticated access to applications that are not capable of using Integrated Windows Authentication (IWA) through Active Directory (AD).
Developed to provide flexibility,…
Security questions are a common method of identity authentication—one you’ve probably encountered before. When creating an account or signing up for a service online, users will confidentially share the answers to secret questions with a provider.
Typically, these security questions and answers are used for self-service password recovery…
You’ve just adopted a new service! Great! But no one is using it. Why not? It appears that no one has access to the application, so no one wants to create a new account with a new set of credentials. Even worse, the team who created the system failed to port over all the users. Would you want to use such a system?
This scenario may sound odd, but…
Decentralised identity, often used interchangeably with “self-sovereign identity” (SSI), is gaining ground as an alternative to today’s centralised and federated infrastructures. In short, it allows individuals to manage their own identities. In a decentralised framework, the user receives credentials from a number of issuers (e.g., government,…
From CRMs for salespeople to invoice systems for accountants, the proliferation of SaaS web apps has made life easier for many employees. However, even the adoption of the most productivity-enhancing apps can lead to unintended inefficiencies and risks. These can range from frequent “I forgot my password” calls that inundate the IT department to…
A one-time password or passcode (OTP) is a string of characters or numbers that authenticates a user for a single login attempt or transaction. One-time passwords are created by an algorithm, that generates a unique value for each OTP by factoring in contextual information, like time-based data or previous login events.
Tech support teams…
What is conditional access?
Your organisation’s applications and resources are being accessed daily by employees located in hundreds of different locations. At the same time, hackers and other cyber criminals are looking for ways to access your sensitive data themselves, trying to exploit gaps in your authentication process.
Conditional access is…
SCIM, or System for Cross-domain Identity Management, is an open standard that allows for the automation of user provisioning. It was created in 2011 as it became clear that the technology of the future would be cloud-based. SCIM communicates user identity data between identity providers (such as companies with multiple individual users) and…
Customer identity and access management (CIAM) is a necessity for business today. But, the wrong solution is seeing increased pressure on in-house IT and developer teams. After all, CIAM includes not only the sign-in/login experience but also the registration and sign-up process throughout an entire customer journey. This gives teams a huge…
Doing right by patients is as important to today’s healthcare professionals as it was to those who founded the NHS. But with an ageing population, more people suffering with multiple morbidities, post-pandemic elective waiting lists remaining high, and the numbers visiting A&E departments soaring, what role can modern Identity management play…