Authentication Devices

2y ago
19 Views
2 Downloads
1.13 MB
8 Pages
Last View : 9d ago
Last Download : 3m ago
Upload by : Jacoby Zeller
Transcription

AuthenticationDevices

Authentication Devices –ActivID Tokens It’s common knowledge that passwords aren’t enough. In fact, weak passwordsare the #1 cause of information breaches. In today’s age of increasing threats andstrict compliance demands, it’s critical to move beyond passwords to more secureauthentication methods to ensure the person asking for access is who they say they are.Enter multi-factor authentication. Multi-factor authentication requires the user to provetheir identity by presenting two or more pieces of evidence. These factors can includesomething they know, something they have, or something they are. A popular methodis the use of security tokens to provide a one-time passcode.ActivID tokens generate random passcodes that cannot be re-used. End users gainaccess to resources by possession of the token and knowledge of a PIN number.Common use cases include: Employee authentication to corporate resources such as workstations, cloudapplications, remote access/VPNs, and more.ActivID Token Benefits I ncreased Security –Tokens deliver additionalauthentication factors andcannot be re-used E ase of Use - End-users simplyenter the PIN on a hand-heldtoken to activate the securitycapabilities of the device B road Support - Supports awide range of authenticationmethods H igh Flexibility - Customizedoptions for specificapplications enables anoptimum balance betweensecurity, cost efficiency anduser-friendliness. Customer authentication to on-line resource, storefronts or digital banking sites. Transaction verification, including digital signatures, for banks, healthcareorganizations and more. Encryption of email and hard disksActivID tokens can also be used in situations where standards bodies have requiredstricter data protection to achieve regulatory compliance.HID Global offers a broad portfolio of solutions to best match your specific needs –including physical and digital options. ActivID One Time Passcode Tokens ActivID USB Tokens Soft TokensThese tokens can be customized for both look and security profile, and are supportedby an end-to end ecosystem for easier deployment and support.

HID ActivID One-TimePasscode TokensActivID Mini TokenActivID Flexi TokenThe simple one-clickOTP experienceand robust casingalso deliver a costeffective solution forlarger deployments.Robust and reliable,security options andgraphical skins canbe easily customizedto match corporatepolicies and branding.ActivID One TokenActivID Pocket TokenThe simple userexperience withwallet sized formfactor encouragesimmediate useradoption.Designed for mobileusers, they are toughand long-lasting, butstill easy to use.ActivID KeyChain TokenActivID Desktop TokenOffer a range ofauthenticationmethods in acompact and durablepackage - greatfor Field Serviceemployees.The larger displayface and buttonssimplify PIN entry toreduce eye strain with voice enabledauthenticationfor the physicallyimpaired.ActivID BlueTrust tokenThe BlueTrust Token delivers OneClick authentication with a fastand easy user experience. Thedevice supports Bluetooth wirelesstechnology, and removes the burdenof typing passwords. The generatedOTP is automatically forwardedto the computer or mobile device,providing a simple user experiencewithout sacrificing privacy andsecurity.In addition to the improved userexperience, they are easy to support.They are FIDO compliant - so canaccess multiple applications withoutthe need for pre-installed softwareor a client app.

Customized Token ExamplesToken Servicesand AccessoriesToken Customization OptionsActivID Tokens offer multiple options for customization in both the token look andthe electrical profile.Graphical Customization: The ActivID Mini-Token can be delivered in a variety ofcasing colors to match your brand guidelines. The ActivID Flexi Token offers colorcasing, graphical customization, and custom labelling on the device.Electrical Profile Customization: ActivID Tokens offer a variety of options to bestmeet your security practices and process, including these categories: Security Services: Everything related to applications required for your solution –including host verification and length of the OTP Algorithms: Select the algorithms used during authentication and datasignature PIN Policy: Configure options around the PIN, including: PIN protection, initialPIN, PIN length, weak PIN control and the unlock process.AccessoriesActivID Coupler foronsite initialization ofthe token through acontactless interface. Behavior: Related to the general management of the token, including font/messages and power timeoutSimplified Deployment with Device Initialization ToolThe Device Initialization Tool is a powerful utility to quickly and easily configure theelectrical profile of ActivID Tokens. With this tool, an administrator can: Configure the token to the specific parameters defined by the administratorToken Pouches fordevice protection andeasier carrying. Control and secure the security keys loaded into tokens Ensure the electrical profile loaded into the token has been signedThe tool itself if also secured with a pre-programmed set of security services toprotect access of the console, pre-defined profile signing process, and robust auditservices.

ActivID USB TokensActivID ActivKey SIM provides strong security in an easyto-use, portable form factor that has the same two-factorauthentication, digital signature and encryption capabilities as a smart card.This USB key combines the security of a smart card with a built-in USB reader. Thefield-serviceable subscriber identity module (SIM) provides organizations a path forfuture upgrades, without requiring them to purchase additional readers.Mobile Soft TokensHID also provides a soft token option, through HID Approve,to enable organizations to leverage the devices theiremployees already carry - including smartphones, tablets,and laptops - to authenticate. Soft tokens deliver a simpleand efficient solution for distribution, activation and reuse.HID Approve soft tokens are available on Apple iPhone,Android and Windows 10.Authentication EcosystemAll of these one time password devices or tokens work with ActivID back endinfrastructure to facilitate the authentication of the entity that attempts to access thesystem or network. HID Global provides these options to best fit your unique needs.ActivID Authentication Server SoftwareThe ActivID Authentication Server provides a flexible platform that can grow withthe authentication needs of any business. Built-in support for open protocols ensuresthat it can be easily integrated into any enterprise infrastructure, cloud based serviceand/or internet banking engine.ActivID Authentication Server ApplianceThe ActivID Authentication Server Appliance delivers the same functionality asAuthentication Server, but is available as a virtual appliance or as hardware forsimplified deployment. The ActivID Appliance strikes the perfect balance betweensecurity, flexibility, cost and convenience.HID ApproveHID Approve not onlyprovides mobile softtoken functionalityfor secure access,but also deliverstransactionverification functionality through theconvenience of mobile push notifications.In addition, out-of-the box customizationoptions enable organizations to re-brandthe app with their logo and color schemes,removing the need to build and maintaintheir own solution.All of this functionality is also availableas a Software Development Kit forintegration into existing corporateapplications. You are empowered tochoose the application that best meetsyour business needs.

ActivID Authentication DevicesProduct Selection GuideActivID OTP TokenMini TokenProduct DescriptionLow cost for userauthentication featureonly and high volumeFlexi TokenKeyChain TokenOne TokenLow Cost PinPad Tokenfor high volume andfast delivery. Front andback customizationCompact and robustdesign with the same options as the Token OneRange ofauthentication optionsplus PIN managementPPPUse CasesStandalone DeviceConnected DevicePxxxxsoftwarePPPUser Authentication (WEB, VPN)PPPPWindows LogonxxxxElectronic SignaturexPPPHost VerificationxPPPEmail Encryption and PKI features (PKIlogon)xxxxPhysical Access - SEOS basedxxxxActivID Time/Event basedPPPPOATH HOTP (Event based) OTP RFC4226PoptionoptionoptionOATH TOTP (Time-based) OTP RFC6238PPoptionoptionChallenge/Response - X9.9xPPPOCRA - RFC6287xoptionoptionoptionPKI with X.509 CertificatesxxxxAES and ECC capabilitiesxxxxPIN activated DeviceSupported AlgorithmHuman InterfaceKeypad1121212LCD Size (Characters)8101010DisplaySegmentsSegmentsDot Matrix (4x7)Dot Matrix (5x7)Define you character fonts for otherlanguagesxxPPSequenced menu (Mode V2)xxPPup to 3 applications (Mode V3)xPoptionoption8588Power Supply and MechanicalsBattery Life Expectancy (based onscenario)Replaceable batteryDimensions (L x W x H in mm)Weight (g)xxxP45 x 38 x 1263 x 43 x 5.462 x 43 x 1282 x 52 x 5.425202525Operating SystemWidnows XP/7/8/10/ServerRequire Additional softwareLinux, Mac oS XMiscVoice EnabledxxxxWaterproof (IPX67)PPxxMulti -Color LEDxxxxField upgradableOn site ctless

ActivID Authentication DevicesProduct Selection Guide (cont’d)ActivID OTP TokenPocket TokenProduct DescriptionSmall, durable tokenwith the same optionsas the Token OnActivID USB TokenDesktop TokenBlueTrust TokenLarge button and displaywith synthetic speechcapability for easier keyentry and readibility"Multi-purposecontactless tokens forIT BlueTooth and NFCActivKey SIMA smart USB Token forPKI-based securityUse CasesStandalone DevicePPPxConnected DevicexxPPPIN activated DevicePPsoftwaresoftwareUser Authentication (WEB, VPN)PPPPWindows LogonxxxPElectronic SignaturePPxPHost VerificationPPxxEmail Encryption and PKI features (PKIlogon)xxxPPhysical Access - SEOS basedxxDemoxSupported AlgorithmActivID Time/Event basedPPxPOATH HOTP (Event based) OTP RFC4226optionoptionoptionxOATH TOTP (Time-based) OTP RFC6238optionoptionPxPPxxChallenge/Response - X9.9OCRA - RFC6287optionoptionxxPKI with X.509 CertificatesxxxPAES and ECC capabilitiesxxxPHuman InterfaceKeypad12121xLCD Size (Characters)10108xDot Matrix (5x7)Dot Matrix (5x7)SegmentsxDefine you character fonts for otherlanguagesPPxxSequenced menu (Mode V2)PPxxoptionoptionxx885xDisplayup to 3 applications (Mode V3)Power Supply and MechanicalsBattery Life Expectancy (based onscenario)Replaceable batteryDimensions (L x W x H in mm)Weight (g)xPxx46 x 68 x 8140 x 108 x 3545 x 38 x 1471.3 x 20 x 8.8282253012Win 10CCIDxCCIDxOperating SystemWidnows XP/7/8/10/ServerLinux, Mac oS XRequire Additional softwareMiscVoice EnabledxPxWaterproof (IPX67)xxxxMulti -Color LEDxxxPxxPxcontactlesscontactlessxUSBField upgradableOn site reinitialization

North America: 1 512 776 9000 Toll Free: 1 800 237 7769Europe, Middle East, Africa: 44 1440 714 850Asia Pacific: 852 3160 9800 Latin America: 52 55 5081 1650 2018 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, the Chain Design,ActivID and ActivKey are trademarks or registered trademarks of HID Global in the US and other countries and may not be usedwithout permission. All other trademarks, service marks, and product or service names are trademarks or registered trademarksof their respective owners.2018-03-07-iam-activid-otp-tokens-br-enAn ASSA ABLOY Group brandhidglobal.comPLT-03688

ActivID Time/Event based P P x P OATH HOTP (Event based) OTP - RFC4226 option option option x OATH TOTP (Time-based) OTP - RFC6238 option option P x Challenge/Response - X9.9 P P x x OCRA - RFC6287 option option x x PKI with X.509 Certificates x x x P AES and ECC capabilities x x x P Human I

Related Documents:

unauthorised users. Generally, authentication methods are categorised based on the factor used: knowledge-based authentication uses factors such as a PIN and password, token-based authentication uses cards or secure devices, and biometric authentication uses fingerprints. The use of more than one factor is called . multifactor authentication

Broken Authentication - CAPTCHA Bypassing Broken Authentication - Forgotten Function Broken Authentication - Insecure Login Forms Broken Authentication - Logout Management Broken Authentication - Password Attacks Broken Authentication - Weak Passwords Session Management - Admin

utilize an authentication application. NFC provides a list of possible authentication applications for employees to use on the two-factor authentication screen in My EPP, but they may use other authentication applications or browser plugins. Authentication applications are device specific i.e. Windows, iOS (Apple), and Android.

RSA Authentication Agent for Microsoft Windows RSA Authentication Agent for Mi crosoft Windows works with RSA Authentication Manager to allow users to perform two-factor authentication when accessing Windows computers. Two-factor authentication requires something you know (for example, an RSA SecurID PIN) and something you have (for

The Concept of Two Factor Authentication Two factor authentication is an extra layer of authentication added to the conventional single factor authentication to an account login, which requires users to have additional information before access to a system is granted (Gonzalez, 2008). The traditional method of authentication requires the

authentication, (2) Biometric supported authentication, and (3) Knowledge supported authentication. Token supported authentication makes use of key cards, bank cards, and smart cards. Token supported authentication system sometimes uses kno

1. To study the QR code technology for document authentication process ii. To develop a certificate authentication system using QR code iii. To evaluate the functionality of the document authentication system 1.4 Scope i. Target user The target user of this system is the employers who will be the person to check authentication of certificate. ii.

Sentinel Log Manager 1.0.0.4 Administration Guide. LDAP Authentication Sentinel Log Manager now supports LDAP authentication in addition to the database authentication. A new Authentication Type option has been added in the user Add a user window of the Sentinel Log Manager, which enables you to create user accounts that use LDAP authentication.