Introduction A solid Identity and Access Management (IAM) strategy is more crucial than ever in the digital era. IAM ensures that the appropriate people have access to the..
Introduction In recent years, biometrics has emerged as a revolutionary technology in the field of identity management and access control. With the advancement of smart devices..
In real life we tend to value those traits that make us unique from others; but in an identity management deployment uniqueness is essential to the authentication process and..
The OpenAM Authentication Service can be configured to lock a user’s account after a defined number of log in attempts has failed. Account Lockout is disabled by default, but when..
In fact, it’s HIGHLY recommended…. Performance testing and stress testing are closely related and are essential tasks in any OpenAM deployment.
The exchange of SAML assertions between an Identity Provider (IdP) and a Service Provider (SP) uses Public-key Cryptography to validate the identity of the IdP and the integrity..
Interesting read. This is essentially a WebSSO initiative with authentication based on CAC type ID cards or OpenID.
By now, many of you have already heard about the hacking of Alaska Governor Sarah Palin’s Yahoo e-mail account earlier this week (on or about Tuesday 9/16/2008). If not, here is a..