SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
www.interoute.com
Overview
The Managed Secure Remote User Authentication service replaces static passwords with personalised, one-
time passwords via a “token” which can be used to grant access to the Interoute-supplied Roaming Access
service and extended to cover your own (or third party) cloud, applications or network.
The two factors involved here are ‘something you know’ and ‘something you have’. A common example of this
combination is a bank card: the personal identification number (PIN) is a secret know by the user, and the card
itself is the physical item (token).
The password an end user utilises to make use of this service is composed of a PIN and a piece of information
provided by a hardware or software token.
This multiple factor authentication reduces the incidence of online identity theft, because a password is no
longer enough to give a thief access to your VPN or applications.
Managed Secure Remote
User Authentication
2
www.interoute.com
Technical Service Details
Interoute, using carefully selected third parties, supplies and supports Two-Factor Authentication (also known
as 2FA) as either as a complement for Roaming Access via IPsec or SSL as well as a standalone service for your
own specific needs (for example, access to a web server, a cloud service, etc.)
Once implemented, the customer (via a nominated administrator) assumes control of the management and
provisioning of its token inventory using the 3
rd
party’s web portal.
The web portal allows the customer and their end users to perform basic operations with their tokens, such as
token re-synchronisation and PIN change.
When ordered as a standalone service, the customer is responsible of configuring their equipment to send
authentication requests directly to the 2FA supplier’s infrastructure. Interoute can provide configuration
documentation from the supplier as well as give support customers who require it.
Interoute 2FA service is supported by hardware or software tokens:
Hardware tokens (fob)
A hardware token is similar to a key-fob, which shows the current one-time password. The token is
synchronised with the authentication server and the password cycles regularly.
Hardware tokens are tamper-resistant, tamper-evident and machine independent, allowing a user to logon
from any location or machine.
Software-based token
A cryptography piece of software is installed on your computer or smart phone, which generates a one-time
password anytime you have to present your login credentials.
Software tokens can be massively deployed without hardware distribution. See the table under Customer
Requirements for available platforms.
Note: Interoute provides limited support for software-related troubleshooting (see Limitations).
3
www.interoute.com
Customer Requirements
Once the tokens are shipped to a designated customer location – for hardware tokens – or made available to
the customer via the 3
rd
party portal for software tokens – it is the customer’s responsibility to enrol the end
users.
The software tokens can be used on the following platforms:
Platform Operating System
Windows PC (32/64 bit) XP, Vista, 7, 2003 Server, 2008 Server
iPhone, iPad iOS 4.1 or later
BlackBerry OS 4.5 or later
Table 1: Platform and operating system availability for software tokens
Supported Service Changes
• For any existing service, you can order additional tokens (regardless of type)
Reporting
Token usage log and any authentication events are available via the 3
rd
party web portal.
Limitations
Support scope for software tokens is limited to dealing with outages affecting the 2FA provider service; any
problems resulting from non-network customer configuration or faults in computer and network operating
systems (e.g. Windows, Blackberry, Apple iOS, etc.) or any third party software are not within scope.
Billing
The following Billing plan is available for Interoute’s Managed Secure Remote User Authentication Service:
• An initial non-recurring charge for service setup and – if applicable – token purchase.
• A monthly flat rate charge based on the number of tokens
Product Codes
Service Code
Two-Factor Authentication SVC-TOKEN
Related services
The Managed Secure Remote User Authentication Service improves security of Roaming Access Service to
VPN
How to order
Order through an Interoute Account Manager or via the HUB, Interoute’s online portal.
More information
For product enquiries, please consult the Security Services Product Manager.

Weitere ähnliche Inhalte

Was ist angesagt?

Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
Hai Nguyen
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
Hai Nguyen
 
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
imec.archive
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 
Online voting job presentation
Online voting job presentationOnline voting job presentation
Online voting job presentation
bondito
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
segughana
 

Was ist angesagt? (20)

Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Two factor authentication
Two factor authenticationTwo factor authentication
Two factor authentication
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
A Complete Software Engineer With Hardware / Networking Skill's
A Complete Software Engineer With Hardware / Networking Skill'sA Complete Software Engineer With Hardware / Networking Skill's
A Complete Software Engineer With Hardware / Networking Skill's
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
Glossary of PCI terms
Glossary of PCI termsGlossary of PCI terms
Glossary of PCI terms
 
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
Architecture and security - Gauthier Van Damme (IBBT-COSIC- K.U.Leuven) & Kri...
 
Smart pass smartphone MFA password manager
Smart pass smartphone MFA password managerSmart pass smartphone MFA password manager
Smart pass smartphone MFA password manager
 
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM iCombat Passwords on Post-Its with Multi-Factor Authentication for IBM i
Combat Passwords on Post-Its with Multi-Factor Authentication for IBM i
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
120 i143
120 i143120 i143
120 i143
 
Adding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with AuthyAdding Two Factor Authentication to your App with Authy
Adding Two Factor Authentication to your App with Authy
 
Introduction to Solus
Introduction to SolusIntroduction to Solus
Introduction to Solus
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Avoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not AloneAvoiding Two-factor Authentication? You're Not Alone
Avoiding Two-factor Authentication? You're Not Alone
 
Online voting job presentation
Online voting job presentationOnline voting job presentation
Online voting job presentation
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 

Ähnlich wie Datasheet two factor-authenticationx

Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
gilpinleeanna
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
Hai Nguyen
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
Conference Papers
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
Lisa Brown
 

Ähnlich wie Datasheet two factor-authenticationx (20)

Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay Examples
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
Authentication Systems in Internet of Things
Authentication Systems in Internet of ThingsAuthentication Systems in Internet of Things
Authentication Systems in Internet of Things
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Two-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless ApproachTwo-factor Authentication: A Tokenless Approach
Two-factor Authentication: A Tokenless Approach
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
Tatyana-Arnaudova - English
Tatyana-Arnaudova - EnglishTatyana-Arnaudova - English
Tatyana-Arnaudova - English
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
test
testtest
test
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1Nt1310 Unit 1 Assignment 1
Nt1310 Unit 1 Assignment 1
 
IoT setup and pairing
IoT setup and pairingIoT setup and pairing
IoT setup and pairing
 
VBOT
VBOTVBOT
VBOT
 

Mehr von Hai Nguyen

Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
Hai Nguyen
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
Hai Nguyen
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Hai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
Hai Nguyen
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
Hai Nguyen
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
Hai Nguyen
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
Hai Nguyen
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
Hai Nguyen
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
Hai Nguyen
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
Hai Nguyen
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
Hai Nguyen
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
Hai Nguyen
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
Hai Nguyen
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
Hai Nguyen
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013
Hai Nguyen
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
Hai Nguyen
 

Mehr von Hai Nguyen (20)

Sms based otp
Sms based otpSms based otp
Sms based otp
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Gambling
GamblingGambling
Gambling
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Csd6059
Csd6059Csd6059
Csd6059
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Bi guardotp
Bi guardotpBi guardotp
Bi guardotp
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 
Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Datasheet two factor-authenticationx

  • 1. www.interoute.com Overview The Managed Secure Remote User Authentication service replaces static passwords with personalised, one- time passwords via a “token” which can be used to grant access to the Interoute-supplied Roaming Access service and extended to cover your own (or third party) cloud, applications or network. The two factors involved here are ‘something you know’ and ‘something you have’. A common example of this combination is a bank card: the personal identification number (PIN) is a secret know by the user, and the card itself is the physical item (token). The password an end user utilises to make use of this service is composed of a PIN and a piece of information provided by a hardware or software token. This multiple factor authentication reduces the incidence of online identity theft, because a password is no longer enough to give a thief access to your VPN or applications. Managed Secure Remote User Authentication
  • 2. 2 www.interoute.com Technical Service Details Interoute, using carefully selected third parties, supplies and supports Two-Factor Authentication (also known as 2FA) as either as a complement for Roaming Access via IPsec or SSL as well as a standalone service for your own specific needs (for example, access to a web server, a cloud service, etc.) Once implemented, the customer (via a nominated administrator) assumes control of the management and provisioning of its token inventory using the 3 rd party’s web portal. The web portal allows the customer and their end users to perform basic operations with their tokens, such as token re-synchronisation and PIN change. When ordered as a standalone service, the customer is responsible of configuring their equipment to send authentication requests directly to the 2FA supplier’s infrastructure. Interoute can provide configuration documentation from the supplier as well as give support customers who require it. Interoute 2FA service is supported by hardware or software tokens: Hardware tokens (fob) A hardware token is similar to a key-fob, which shows the current one-time password. The token is synchronised with the authentication server and the password cycles regularly. Hardware tokens are tamper-resistant, tamper-evident and machine independent, allowing a user to logon from any location or machine. Software-based token A cryptography piece of software is installed on your computer or smart phone, which generates a one-time password anytime you have to present your login credentials. Software tokens can be massively deployed without hardware distribution. See the table under Customer Requirements for available platforms. Note: Interoute provides limited support for software-related troubleshooting (see Limitations).
  • 3. 3 www.interoute.com Customer Requirements Once the tokens are shipped to a designated customer location – for hardware tokens – or made available to the customer via the 3 rd party portal for software tokens – it is the customer’s responsibility to enrol the end users. The software tokens can be used on the following platforms: Platform Operating System Windows PC (32/64 bit) XP, Vista, 7, 2003 Server, 2008 Server iPhone, iPad iOS 4.1 or later BlackBerry OS 4.5 or later Table 1: Platform and operating system availability for software tokens Supported Service Changes • For any existing service, you can order additional tokens (regardless of type) Reporting Token usage log and any authentication events are available via the 3 rd party web portal. Limitations Support scope for software tokens is limited to dealing with outages affecting the 2FA provider service; any problems resulting from non-network customer configuration or faults in computer and network operating systems (e.g. Windows, Blackberry, Apple iOS, etc.) or any third party software are not within scope. Billing The following Billing plan is available for Interoute’s Managed Secure Remote User Authentication Service: • An initial non-recurring charge for service setup and – if applicable – token purchase. • A monthly flat rate charge based on the number of tokens Product Codes Service Code Two-Factor Authentication SVC-TOKEN Related services The Managed Secure Remote User Authentication Service improves security of Roaming Access Service to VPN How to order Order through an Interoute Account Manager or via the HUB, Interoute’s online portal. More information For product enquiries, please consult the Security Services Product Manager.