Computers Security Authentication
87
Authentication is the method a computer uses to ensure that you are who you say you are. Authentication can be as simple as requesting a password. More complex authentication schemes involve voice printing technology, fingerprint or retinal scans. In some systems, users carry smart cards which are part of the authentication.

Subcategories 8

Related categories 3

Finally Software
Enterprise security solutions based on PKI and Kerberos. Also offer a secure terminal emulator for connecting to Unix servers from Windows. Product information and downloadable evaluation software.
IIS User Authentication Tutorial
Information on various methods for WWW password protection using Internet Information Server (IIS). Text-based tutorial with some screenshots.
iisPROTECT
Functions with Internet Information Server to secure web sites. Includes live demo.
Intertrust Technologies Corporation
Develops general purpose digital rights management platform which serves as foundation for providers of digital information, technology and commerce services to participate in a global system for digital commerce. (Nasdaq: ITRU).
Liberty Alliance Project
Standards organization with a global membership that provides a holistic approach to identity through open technical specifications. Specifications, initiatives and membership.
M-Tech Information Technology, Inc.
ID-Synch, identity management software for managing user administration processes. Product information, customers, press releases and contact details.
NMA, Inc.
ZSentry two-factor authentication solution. Product information, white papers and contact details.
The Open Group: Identity Management Forum
Consortium promoting open standards-based identity management. Includes downloadable white papers and information on current projects.
Open Systems Management
Password synchronization and role based access control across UNIX, Windows NT and resident applications. Site contains FAQs.
Password Management
Paper by M. Bishop, 1991. Discusses problems of password selection and password management, and identifies relevant techniques. [PDF]
Pluggable Authentication Modules
Sun's official PAM documentation. Programmer documentation and source code.
A Proactive Password Checker
Paper by M. Bishop, 1991. The author describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. [Postscript]
Remote User Authentication in Libraries
A collection of resources for libraries and universities. Includes links to software and some links of interest to non-librarians.
Secure Remote Passwords
Software integrates into existing networked applications. Secure telnet and FTP available. Open source. User and technical documentation as well as source code.
Unisys
Makers of several related products. Includes rationale as well as usage information.
Vasco
Makers of both software and hardware systems. Demos, case studies and product information.
[Key Mozilla]
Category editor:
xenon5
Last update:
September 20, 2016 at 7:35:07 UTC
Computers
Games
Health
Home
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports
All Languages
Arts
Business