Top-Rated Free Essay
Preview

Access Control

Good Essays
648 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Access Control
OATH (Open Authentication)
Alvin Claxton
Grantham University

Abstract

The need for stronger authentication methods on line has never been in more demand than at present. There are many services that provide security and authentication while on line or to verify who is the end user. With the rise of identity theft among other cyber crimes, the need for stronger authentication is greatly needed. This written assignment will define, describe and explain OATH (Open Authorization) as a preferred choice for authentication method and the benefits of OATH.

Strong authentication on the World Wide Web is an ongoing process that requires advanced software and technology to identify an end user and making sure they are who they say they are. The alarming and escalating reports of online identify theft has all end users worried about their PII online and has sparked the industry to put in place stronger and more comprehensive methods of online security measures.
After researching both user authentication framework processes, I have decided in favor of OATH (Open Authentication). OATH is used more widely by industries than SAML and has some features and benefits that are not favorable with SAML. SAML tends to be more organizational and serve large groups rather than smaller or more independent infrastructures. It provides stronger authentication, offers more hardware choices, has the lowest cost of ownership, it supports many mobile and is designed to integrate with existing platforms and infrastructures.
OATH is being used and endorsed by companies like IBM, Axalto, Gemplus and VeriSign, who is a large leader in the online webpage security process. It delivers strong authentication to build open communities where end users and all devices are strongly authenticated, while providing for interoperability and possibility of federated identities. They are dedicated to provide low cost multi-function authentication devices such as smart/cell phones, PDAs and tablets. Users are always concerned about the security level on these portable devices. It will use soft tokens and smart cards as well as OTP, SIM and PKI based authentication methods.

OATH has shown their importance in the industry by proposing a model of Open Strong Authentication based primarily on existing standards that ensure secure credentials can be provisioned and verified by disparate software and hardware platforms. It will help drive strong authentication deep into the network infrastructures making deployment of strong authentication possible for large user populations in a variety of scenarios.
OATH is the only collaborative industry effort focused on expanding market opportunities with stakeholders, manufacturers, software vendors and service providers. Currently a user ID and password are the predominantly and most frequently method used for authentication. This method is highly prone to cyber hacking and there is always a risk of someone stealing your information using this method. Online identities secured only by passwords can be exploited, resulting in identity theft or compromised systems. Existing tow-factor authentication approaches, while more effective, are often expensive and complex, and their lack of interoperability poses significant barriers to adoption. OATH reduces cost and is much more adoptable.
With the use of OATH authentication methods, we can and will reduce the bad guys from obtaining our personal information. An average person has more than ten passwords, which is fairly easy for hackers to figure out with time and patience and the complacency of users and keystrokes. The overall fundamental security mechanisms to protect personal information online are fairly unsophisticated. With OATH, they have implemented an industry-wide collaborative effort to promote Open Strong Authentication that will remove barriers and broaden more aspects of on line security to include communication, collaboration, and conducting business.

References

OATH-initiative for open authentication. (2012). Retrieved from http://openauthentication.org/

SecuTech joins open authentication initiative oath. (2012). Retrieved from http://www.esecutech.com/news_display/secutech-joins-open-authentication-initiative-oath.html

OATH authentication security token. (n.d.). Retrieved from http://www.solidpass.com/authentication-methods/oath-authentication.html

References: OATH-initiative for open authentication. (2012). Retrieved from http://openauthentication.org/ SecuTech joins open authentication initiative oath. (2012). Retrieved from http://www.esecutech.com/news_display/secutech-joins-open-authentication-initiative-oath.html OATH authentication security token. (n.d.). Retrieved from http://www.solidpass.com/authentication-methods/oath-authentication.html

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3230 Lab 7 Multi-Factor Authentication Process Chris Wiginton ITT Technical Institute, Tampa FL Instructor: David Marquez 1 May 2014 Multi-Factor Authentication Process Area Authentication Process(es) Authentication Factors Authentication and Authorization LDAP /Kerberos Authentication, Token , Session Timeline Username , Password Token, Pin, Biometric Device Support Device should not be end of life and under support contract Vendor Supported Firewalls using Approved Product List (APL) Interoperability ISO and IEEE Standards for Encryption Multi-Vendor Interoperability based on AES, 3DES Standards, and SSL Encryption methods. Multiprotocol Support TCP, UDP, ESP, SSL ACL only allows trusted endpoints based on Port and Protocol Packet Encryption IKE - Internet Key Exchange VPN 2 Phase Negotiation based on Pre-Share Key, VPN Certificate Authentication.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    9. An open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1230 Unit Excer1

    • 313 Words
    • 2 Pages

    Advanced Encryption Standard support for the Kerberos protocol – logins are a lot more secure.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    is3230 week1 assgnmnt1

    • 362 Words
    • 3 Pages

    References: Ballad, Bill, Tricia Ballad, and Erin K. Banks. 2011. Access Control, Authentication, and Public Key Infrastructure. Sudbury: Jones & Bartlett Learning.…

    • 362 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    1. Where can you store your public keys or public certificate files in the public domain? Is this the same thing as a Public Key Infrastructure (KI) server?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Better Essays

    In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Lab 2

    • 473 Words
    • 2 Pages

    How does OAuth 1 or OAuth 2 impact the bottom line cost to a corporation versus the impact to the client and their privacy? By conducting a quantitative research study, I will survey the top 10 most popular websites based on number of users and document which protocol they use, how much money is spent on implementing cybersecurity measures and finally, how OAuth 1 or OAuth 2 affects the consumer. I will catalog how OAuth 1 or OAuth 2 affects the client by determining how often the user’s personal information is unwillingly…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Davidson, Mary Ann. Security Seminar. “Information Security.” Lecture. Chief Security Officer. Oracle Government, Education and Healthcare, Oracle Corporation, Reston, VA: October 16, 2001.…

    • 26520 Words
    • 107 Pages
    Good Essays
  • Powerful Essays

    Office 365 White Paper

    • 3872 Words
    • 16 Pages

    © 2013 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes.…

    • 3872 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Final Test

    • 3035 Words
    • 13 Pages

    __________ is a Microsoft-proprietary protocol that authenticates users and computers based on an authentication challenge and response.…

    • 3035 Words
    • 13 Pages
    Powerful Essays