Searchalot
 

Internet Directory - Top : Computers : Security : Authentication

Top : Computers : Security : Authentication (106 web sites)
Access Control Hardware
Biometrics
Kerberos
LDAP
Multi-factor Authentication  
One Time Passwords
RADIUS
Single Sign-On  
 Related Categories
Computers: Software: Business: E_Commerce
Computers: Security: Internet
Computers: Hardware: Systems: Smartcards
 Related Web Pages

A Proactive Password Checker
Paper by M. Bishop, 1991. The author describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. [Postscript]
http://seclab.cs.ucdavis.edu/papers/mb91c.ps

Finally Software
Enterprise security solutions based on PKI and Kerberos. Also offer a secure terminal emulator for connecting to Unix servers from Windows. Product information and downloadable evaluation software.
http://www.finallysoftware.com/

IIS User Authentication Tutorial
Information on various methods for WWW password protection using Internet Information Server (IIS). Text-based tutorial with some screenshots.
http://www.authenticationtutorial.com/

Intertrust Technologies Corporation
Develops general purpose digital rights management platform which serves as foundation for providers of digital information, technology and commerce services to participate in a global system for digital commerce. (Nasdaq: ITRU).
http://www.intertrust.com/

Liberty Alliance Project
Standards organization with a global membership that provides a holistic approach to identity through open technical specifications. Specifications, initiatives and membership.
http://www.projectliberty.org/

M-Tech Information Technology, Inc.
ID-Synch, identity management software for managing user administration processes. Product information, customers, press releases and contact details.
http://mtechit.com/

NMA, Inc.
ZSentry two-factor authentication solution. Product information, white papers and contact details.
http://www.nma.com/

Open Systems Management
Password synchronization and role based access control across UNIX, Windows NT and resident applications. Site contains FAQs.
http://www.cosbatch.com/

Password Management
Paper by M. Bishop, 1991. Discusses problems of password selection and password management, and identifies relevant techniques.
http://seclab.cs.ucdavis.edu/papers/pdfs/mb-91.pdf

Pluggable Authentication Modules
Sun's official PAM documentation. Programmer documentation and source code.
http://www.sun.com/software/solaris/pam/

Remote User Authentication in Libraries
A collection of resources for libraries and universities. Includes links to software and some links of interest to non-librarians.
http://library.smc.edu/rpa.htm

Secure Remote Passwords
Software integrates into existing networked applications. Secure telnet and FTP available. Open source. User and technical documentation as well as source code.
http://srp.stanford.edu/

The Open Group: Identity Management Forum
Consortium promoting open standards-based identity management. Includes downloadable white papers and information on current projects.
http://www.opengroup.org/idm/

Unisys
Makers of several related products. Includes rationale as well as usage information.
http://www.unisys.com/

Vasco
Makers of both software and hardware systems. Demos, case studies and product information.
http://www.vasco.com/

iisPROTECT
Functions with Internet Information Server to secure web sites. Includes live demo.
http://www.iisprotect.com/