Identity Fusion Blog: Authentication

Exploring User Authentication and Authorization

Exploring User Authentication and Authorization

Introduction Identity and access management (IAM) is a crucial component of cybersecurity that aids businesses in preserving the privacy and security of sensitive data. To..

Read More

Streamlining Security: The Benefits of Single Sign-On

Streamlining Security: The Benefits of Single Sign-On

Introduction A solid Identity and Access Management (IAM) strategy is more crucial than ever in the digital era. IAM ensures that the appropriate people have access to the..

Read More

Unlocking the IAM Future

Biometrics: Unlocking the IAM Future

Introduction In recent years, biometrics has emerged as a revolutionary technology in the field of identity management and access control. With the advancement of smart devices..

Read More

OpenDJ Attribute Uniqueness (and the Effects on OpenAM)

In real life we tend to value those traits that make us unique from others; but in an identity management deployment uniqueness is essential to the authentication process and..

Read More

Understanding OpenAM and OpenDJ Account Lockout Behaviors

The OpenAM Authentication Service can be configured to lock a user’s account after a defined number of log in attempts has failed. Account Lockout is disabled by default, but when..

Read More

stress testing letters with ones and zeros

It’s OK to Get Stressed Out with OpenAM

In fact, it’s HIGHLY recommended…. Performance testing and stress testing are closely related and are essential tasks in any OpenAM deployment.

Read More

woman signing on to laptop with identity security icon overlay

How to Configure OpenAM Signing Keys

The exchange of SAML assertions between an Identity Provider (IdP) and a Service Provider (SP) uses Public-key Cryptography to validate the identity of the IdP and the integrity..

Read More

Opinions About the Federal Government’s Identity Initiative

Interesting read. This is essentially a WebSSO initiative with authentication based on CAC type ID cards or OpenID.

Read More

Identity Management Lessons from Sarah Palin

By now, many of you have already heard about the hacking of Alaska Governor Sarah Palin’s Yahoo e-mail account earlier this week (on or about Tuesday 9/16/2008). If not, here is a..

Read More