What is changing from OAuth 2.0 to OAuth 2.1? OAuth (Open Authorization) pronounced "oh-auth" is a technological standard that allows you to share information between services without exposing your password. OAuth Single Sign-On (SSO) protocol provides the application the capability for secure designated access and sharing of information with enterprise applications OAuth Single Sign-On is [...] Read More →
JIT provisioning automates the creation and updation of user accounts in web applications. It delivers information from an identity provider to web apps via the SAML (Security Assertion Markup Language) protocol. IT administrators no longer have to manually create accounts for each user in every application thanks to JIT provisioning. Rather, user accounts are created [...] Read More →
What is SAML? SAML (Security Assertion Markup Language) is an open standard that enables Identity Providers (IdPs) to send authorization credentials to service providers (SP). For standardized interactions between the identity provider and service providers, transactions through this protocol use Extensible Markup Language (XML). It is the link between a user's identity authentication and their [...] Read More →
What is IDaaS? IDaaS - Identity-as-a-Service, refers to identity management and access management services offered via the cloud rather than on-premises. Identity services maintain the information related to digital entities. In this form, it can be accessed and used in electronic transactions. An "as-a-service" model represents an operation where an external organization provides a service [...] Read More →
When the word "technology" is used, the phrase "authentication and security" immediately comes to mind. Authentication becomes the first baby step in improving security, given the growing requirement for it. The basic job of authentication is to manage user identification and provide them with suitable access control for seamless operation and security. Individual authentication does [...] Read More →
What is the 23 NYCRR Part 500? The NYDFS CyberSecurity Regulation Guidelines, released on March 1 2017, are a set of regulations from the New York Department of Financial Services that places new cybersecurity requirements on financial institutions. These new guidelines under 23 NYCRR Part 500 affected licensed lenders, state-chartered banks, trust companies, service contract [...] Read More →
Authentication and Authorization are often used interchangeably but they are distinct security processes in identity and access management (IAM). Authentication is the process of verifying your identity by confirming your credentials, such as your username/user ID and password. The system then uses your credentials to verify that you are who you claim you are. Authorization [...] Read More →