eBooks & Reports

O'Reilly's Automating Security in the Cloud

Issue link: https://resources.threatstack.com/i/872576

Contents of this Issue

Navigation

Page 15 of 32

Interoperable — Backed by leading internet and financial services. U2F allows every service provider to be their own identity provider, or provide users the option to authenticate through a federated service provider. Cost-ecient — Service providers do not have to take on the cost and support of securely distributing U2F devices. Users can choose from a range of low-cost devices from multiple vendors, available at Amazon and other retail stores worldwide. Yubico offers free and open source server software for back-end integration. Electronic identity — For organizations requiring a higher level of identity assurance, there are services for tying your U2F device to your real identity both online and off‐ line. Secure recovery — It is recommended that users register at least two U2F devices with every service provider should a U2F device be misplaced. Services may also provide the user with a backup code that they store in a safe place. Partners for Secure Cloud Identity & Access Management Okta (https://www.okta.com/) Okta is an on-demand identity and access management service that enables enterpri‐ ses to accelerate the secure adoption of their web-based applications, both in the cloud and behind the firewall. Okta delivers a complete solution that addresses the needs of IT, end users, and business leaders; no customization is required. The service offers: Secure, single sign-on for end users, giving them one place to access the cloud appli‐ cations they need, whenever and wherever they need them Comprehensive user management integrated with Active Directory (AD), including user provisioning and de-provisioning, enabling IT to accelerate the move to the cloud Cross-application analytics spanning usage, utilization, and cost that provide IT with the insight needed to optimize its cloud investments and address its compliance needs By adopting the Okta service, enterprises dramatically improve the security and ease of managing their Software as a Service (SaaS) and cloud-based applications. IT bene‐ fits by using one central place for policy-based management that governs which users get access to the mission critical applications and data that power core business pro‐ cesses. End users benefit by using their Okta single sign-on homepage to simplify their life and reduce the security risks caused by "password fatigue." With Okta, there is no longer a need for users to resort to the typical tricks for memorizing passwords 14 | Chapter 4: Cloud Computing Foundational Security Leading Practices

Articles in this issue

Links on this page

view archives of eBooks & Reports - O'Reilly's Automating Security in the Cloud