Video Screencast Help
Authentication (User) Blog
Showing posts tagged with Authentication
Showing posts in English
Amit Chakrabarty | 27 Sep 2013 | 0 comments

VIP Manager brings in a cool feature called User Groups. This feature enables an enterprise to segment their users into groups and assign credential policies based on user groups. Here is a short video to explain how it is all done. 

This video explains :

  1. How to create User Group on VIP Manager
  2. How to create a group on AD
  3. How to add members to this AD group
  4. How to do an LDAP sync from Enterprise Gateway to populate the User Group created on VIP Manager
  5. How to View and manage User Group on VIP Manager



Amit Chakrabarty | 18 Sep 2013 | 2 comments

We are very excited to demo this cool feature from Symantec VIP, called VIP Mobile Push Authentication. This feature will allow users to get access to resources protected with Symantec VIP  Authentication, with just ONE click. Besides ease of use, it helps avoiding usual errors caused due to manual entry like typing in wrong passcode. 

Instead of going through complex workflow charts to understand how it all works, you can see a demo  :

(Please note this is just a demo to show case how mobile push authentication works. Actual product will look and perform differently.)



nicolas_popp | 20 Apr 2011 | 0 comments

Last week, the White House announced its official National Strategy for Trusted Identities in Cyberspace (NSTIC). NSTIC is the largest-ever effort by the federal government and private sector partners (including Symantec) to develop a secure, standards-based and interoperable online identity system. The goal: Improve the security and privacy of online interactions and more effectively fight cybercrime. Today's announcement marks the culmination of two years of effort by VeriSign (first as an independent company and later as part of Symantec) to help bring this important initiative to life.

At the heart of NSTIC is the concept of an Identity Ecosystem based on trusted identity frameworks. Trusted identity frameworks are the lynchpin to...

chalcon | 17 Jan 2011 | 0 comments

A Sacramento area man was recently arrested and pled guilty to hacking into numerous email accounts of women the U.S. and U.K. The man gained access to the email accounts by using information found on their Facebook profiles to help determine possible email passwords. After gaining access to their email accounts he would scan their email folders for personal information and then share that information with the entire contact list in the hacked email account. The full story can be found here.

In the video below the Bay Area ABC affiliate interviews Atri Chatterjee, vice president of Symantec's User Authentication group, to provide commentary on this story and the security vulnerabilities that come with simple "username and password" type authentication.

nicolas_popp | 06 Sep 2010 | 1 comment

It is clear that high assurance identity on the internet is going to require identity proofing. With more than 1 Billion Web users, and 3 Billion mobile users increasingly connected to the Internet, scalability is going to be essential. If high assurance identities become the norm, digital identify verification services that do not require in-person proofing could therefore turn into a significant market opportunity

Most folks in the industry would tell you that credit bureaux, and financial institutions ought to be primary beneficiaries as the new business emerges. However, the convergence of Internet, mobile and telecommunication driven by iPhone and Android could attract new market players. Mobile network operators (MNOs) have a wealth of identifiable data about us. They are also uniquely positioned to bring to market multi-channel solution. In fact, an MNO-operated ID proofing service could easily support voice and web, for brick and mortar as well as online service...

vipmobile | 01 Jul 2010 | 0 comments

Congratulations to Addison Avenue Federal Credit Union and the U.S. District Court in the District of Columbia, both of which were designated as Laureates by the Computerworld Honors Program. In addition to this honor, Addison Avenue Federal Credit Union was also named as a finalist for the Computerworld 21st Century Achievement Award, an award that honors and documents the extraordinary innovations of individuals and organizations that are leading the global IT revolution.

Addison Avenue Federal Credit Union
Addison Avenue offers its customers the...

nicolas_popp | 02 Jun 2010 | 0 comments

I have been involved with a couple similar initiatives around certification for identity and thought it would be interesting to explain the logic behind these efforts. The first initiative is led by the Open Identity Exchange and is based on the Open Identity stack. The second is more enterprise cloud focused; it is driven by the Cloud Security Alliance (CSA). The CSA is developing a more SAML-oriented technology blueprint within OASIS. The technology protocols are different but the risk controls are similar. Therefore, I am hopeful that both trust frameworks will converge (I will certainly try to help them converge).

But let us re-hash the motivation of the industry that sponsors these efforts. A trust framework is necessary to enable policy...

nicolas_popp | 05 Apr 2010 | 0 comments

This week is the week of the OpenID summit in Mountain View, California. We are all hoping that 2010 will be another pivotal year for open identity. There seems to be a combination of market forces that are making federated identity more attractive. In fact, we are hearing new compelling use cases for federation. A first example is cloud access and identity management. As enterprises shift their IT infrastructure and information to the cloud (as in IAAS, PAAS and SAAS applications), CIOs need to federate corporate identities with cloud service providers. For cloud resources, the corporate directory becomes the identity providers and the cloud services are the relying parties (and if you don't have a directory or don't want to use it for federation, Google is in the pole position to be your OP). Another interesting vertical ripe for federation is healthcare. Now that the Obama bill for healthcare has passed, one should expect a revival of health information networks (remember the...

nicolas_popp | 03 Mar 2010 | 0 comments

The Open Identity Exchange was launched this morning at the RSA conference in San Francisco. It is a significant step for federated identity as it will enable US government web sites such as the NIH to embrace open identity standards and roll out open identity services to US citizens. For example, the National Institute of Health can now move out of pilot phase and support accredited OpenID providers.

So, what is the Open Identity Exchange (OIX)? The OIX aims at enabling specialized trust frameworks or certification programs within a vertical community (e.g. US government, health care, financial services). Certification requirements for shared identity can be diverse and complex depending on the level of assurance required. Simply said, when it comes to trust, one size does not fit all.

You can think of a trust framework as the policy sibling of technical...

vipmobile | 29 Jan 2010 | 0 comments

Han Dong, Senior Product Marketing Manager, User Authentication

One great thing about blogging for a company like VeriSign, which happens to have so many cool tools in its bag, is that it's so easy to find several blogs on the net that mention you. And in this case I'm referring to a Wall Street Journal blog: "Under Surveillance: Big Brother Stocks", by James Altucher. atm.jpg In this blog, Altucher talks about all of the various measures (and money spent - to the tune of $200 billion in the U.S.) taken to automate the monitoring and protection of your banking transactions, checking in at the airport, and even your simple ATM cash withdrawal.