Authentication is the method a computer uses to ensure that you are who you say you are. Authentication can be as simple as requesting a password. More complex authentication schemes involve voice printing technology, fingerprint or retinal scans. In some systems, users carry smart cards which are part of the authentication.
Subcategories 8
Related categories 3
Sites 14
Loading new listings for you to review...
- Intertrust Technologies Corporation Develops general purpose digital rights management platform which serves as foundation for providers of digital information, technology and commerce services to participate in a global system for digital commerce. (Nasdaq: ITRU).
- Secure Remote Passwords Software integrates into existing networked applications. Secure telnet and FTP available. Open source. User and technical documentation as well as source code.
- Unisys Makers of several related products. Includes rationale as well as usage information.
- Vasco Makers of both software and hardware systems. Demos, case studies and product information.
- IIS User Authentication Tutorial Information on various methods for WWW password protection using Internet Information Server (IIS). Text-based tutorial with some screenshots.
- iisPROTECT Functions with Internet Information Server to secure web sites. Includes live demo.
- A Proactive Password Checker Paper by M. Bishop, 1991. The author describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. [Postscript]
- Password Management Paper by M. Bishop, 1991. Discusses problems of password selection and password management, and identifies relevant techniques.
- M-Tech Information Technology, Inc. ID-Synch, identity management software for managing user administration processes. Product information, customers, press releases and contact details.
- NMA, Inc. ZSentry two-factor authentication solution. Product information, white papers and contact details.
- Finally Software Enterprise security solutions based on PKI and Kerberos. Also offer a secure terminal emulator for connecting to Unix servers from Windows. Product information and downloadable evaluation software.
- The Open Group: Identity Management Forum Consortium promoting open standards-based identity management. Includes downloadable white papers and information on current projects.
- Liberty Alliance Project Standards organization with a global membership that provides a holistic approach to identity through open technical specifications. Specifications, initiatives and membership.
- Open Systems Management Password synchronization and role based access control across UNIX, Windows NT and resident applications. Site contains FAQs.