Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

Adaptive Authentication: What, Why and How?

399 visualizaciones

Publicado el

This slide deck explores the evolution of authentication mechanisms, advantages and the disadvantages of each, and how adaptive authentication may be the answer.

Watch the webinar here: https://wso2.com/library/webinars/2019/01/adaptive-authentication-what-why-and-how/

Publicado en: Tecnología
  • Sé el primero en comentar

Adaptive Authentication: What, Why and How?

  1. 1. Adaptive Authentication What, Why and How? Thanuja Jayasinghe, Associate Technical Lead - WSO2 Abilashini Thiyagarajah, Software Engineer - WSO2
  2. 2. WSO2 At-A-Glance Colombo, London, Mountain View, New York, São Paulo, Sydney Founded 2005, Backed by Cisco and Toba Capital 500+ Employees (300 Engineers) Open Source 525+ Customers, 100+ New Customers in 2018 53% YoY growth
  3. 3. Authentication
  4. 4. The process of recognizing a user’s identity in order to provide access to a sensitive resource.
  5. 5. ● Password-based ● Challenge response ● Hardware token ● Software token ● Biometric-based ● Multi-factor authentication ● Adaptive authentication Evolution of Authentication
  6. 6. Single-factor Authentication
  7. 7. OrOr Or
  8. 8. Convenience Security
  9. 9. Multi-factor Authentication
  10. 10. And Or
  11. 11. Convenience Security
  12. 12. Adaptive Authentication
  13. 13. Adaptive authentication is an evolved form of multi-factor authentication(MFA) where the authentication mechanism is decided depending on the user’s risk profile and the behaviour.
  14. 14. Convenience Security
  15. 15. Security Convenience Adaptability
  16. 16. Example:
  17. 17. Adaptive Authentication Scenarios
  18. 18. Role-based Adaptive Authentication
  19. 19. User Age-based Adaptive Authentication
  20. 20. Device-based Adaptive Authentication
  21. 21. Request-based Adaptive Authentication View Balance Fund Transfer
  22. 22. Risk-based Adaptive Authentication
  23. 23. Geo location/IP-based Adaptive Authentication
  24. 24. Geo Velocity Based Adaptive Authentication
  25. 25. ● User attributes ● User behaviour ● Level of Assurance required ● Risk analysis statistics ● Machine learning algorithms Evaluation Criterias
  26. 26. Adaptive Authentication with WSO2 IS
  27. 27. • Supported from WSO2 IS 5.7.0 • Script-based control over authentication flow
  28. 28. Advantages of using WSO2 IS for Adaptive Authentication
  29. 29. ● Brings complex authentication policies in a simple manner ● A comprehensive toolset to design your adaptive authentication sequence ● Open, future-proof adaptive authentication platform ● Designed to quickly integrate with risk engines and external system
  30. 30. WSO2 IS Connectors
  31. 31. Demo
  32. 32. ● WSO2 IS documentation on Adaptive Authentication: https://docs.wso2.com/display/IS570/Adaptive+Authentication ● [White paper] Keep calm and authenticate: Why adaptive is the next big thing https://wso2.com/whitepapers/keep-calm-and-authenticate-why-adap tive-is-the-next-best-thing/ References
  33. 33. Upcoming Webinar on Adaptive Authentication.. “Why upgrade your MFA to Adaptive Authentication?” On Wednesday, February 6, 2019 Register at - https://wso2.com/library/webinars/2019/02/why-upgrade-yo ur-mfa-to-adaptive-authentication/
  34. 34. Q & A
  35. 35. THANK YOU wso2.com

×