eBooks & Reports

O'Reilly's Automating Security in the Cloud

Issue link: https://resources.threatstack.com/i/872576

Contents of this Issue


Page 16 of 32

—obvious or reused passwords, writing passwords down on Post-it notes, or saving them in Excel files on their laptops. Okta's on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. Okta enables enterprise administrators to increase security above what is available through traditional on-premises technologies. By offering strong password manage‐ ment capabilities, account management capabilities, easy-to-deploy multifactor authentication, and encrypted attributes, the enterprise is now able to put strong con‐ trols on high-value data while balancing the ease-of-access users demand. Yubico (https://www.yubico.com/) Yubico changes the game for strong authentication, providing superior security with unmatched ease of use. Their core invention, the YubiKey, is a small USB and NFC device supporting multiple authentication and cryptographic protocols. With a sim‐ ple touch, it protects access to computers, networks, and online services for the world's largest organizations. Our innovative keys offer strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV, OpenPGP, OATH) —all with a simple tap or touch of a button. YubiKeys protect access for everyone from individual home users to the world's largest organi‐ zations. This diagram explains the basic process flow of U2F: Identity & Access Management (IAM) | 15

Articles in this issue

Links on this page

view archives of eBooks & Reports - O'Reilly's Automating Security in the Cloud