News

In this article, we’ll give you a high-level view of how certificate-based authentication works. First, we’ll offer a brief introduction to public-key cryptography, and then we’ll step ...
Since the beginning of distributed personal computer networks, one of the toughest computer security nuts to crack has been to provide a seamless, single sign-on (SSO) access experience among ...
An example of this is the addition of 802.1x authentication to the WLAN security ... is designed to work with existing 802.11 products and offers forward compatibility with 802.11i.
So, in addition to updating that password to a mix of numbers, letters and characters, read on to learn more about how two-factor authentication works and how safe you can feel once you add it to ...
We do have a requirement for 2-factor Authentication due to PCI DSS. Right now, we are using Windows Identity Certificates using a 2003 Enterprise CA. The way it works now is, the user is granted ...