• I need to configure applicationContext-externalAuth-preAuth-mt.xml file to token based authentication

    Here I need to map externel user in the token with internel user in jasper server. How can I do this?

    Prabhath1235 pointsBadges:
  • Pre authientication for hotels

    How do hotels run a pre authentication at check-ins and capture a final amount at check out?

    jonpineda5 pointsBadges:
  • PCI compliance: Disable AUTH on Port 25

    Due to PCI compliance, we have to disable plaintext authentication. We were able to do this through encapsulating communications between our mail server and clients with TLS on port 465. Here's where the problem is: Port 25 has to remain open / unencrypted for us to receive mail, but it shouldn't...

    ITKE376,235 pointsBadges:
  • How to write unique domain authentication identifier

    How do I write udai (unique domain authentication identifier)?

    ramuyadav20 pointsBadges:
  • How to configure in Tacacs+ server and Cisco router for password expiration

    Hi, Currently my Cisco router using Tacacs+ server for authentication. I would like to enhance the password security by forcing the user to change their password every 2 months. After 2 months when they trying to login to the router they will be prompted to key in new password. Is there any way I...

    cslaw20105 pointsBadges:
  • Authentication and authorization issues in e-Commerce

    What are the issues facing authentication and authorization in e-Commerce?

    Mashael19925 pointsBadges:
  • Do any browsers have support for pre-shared-key encryption/authentication?

    My partner and I already have a web application with highly valuable business data. All of our communication is encrypted through TLS/SSL. I know this is a safe protocol but it can still be compromised if someone installed a CA certificate through our computer. So we're trying to strengthen the...

    ITKE376,235 pointsBadges:
  • What is the use of the “secret” displayed when setting up 2 Factor Authentication?

    Is there a purpose to the 'secret' that is always displayed when I take a picture of the QR code to setup a two-factor authentication on a non-Google site? Do I even need it? If I save it, wouldn't anyone be able to get in with the login code?

    ITKE376,235 pointsBadges:
  • How is FIDO U2F different from OTP?

    I recently saw that Google and Yubico announced the availability of cryptographic security tokens, after the FIDO U2F specification. I'm curious to find out if this is just another two-factor authentication or is it significantly better than SecureID or TOTP. Can anyone share their opinion....

    ITKE376,235 pointsBadges:
  • SIP trunking issue: Authentication problems (CUCM and own developed PBX)

    Hey, I have built a PBX by using the Ozeki SDK and and want to connect it to my existing Cisco Unified Communications Manager PBX by using SIP trunking. By following the instructions of this Cisco setup guide, I have successfully connect the SDK to CUCM, but SIP trunking does not work, because of...

    RajeshCO275 pointsBadges:
  • POS null & authentication failure error

    Whenever I recharge my rynga VoIP with my global debit visa card in online an error message comes in my mobile number. That is POS null. authentication failure.

    DINUUZ5 pointsBadges:
  • What is the recommended way to enforce authentication and authorization for Heroku Celadon Cedar apps?

    For my identity and access management tool, I've been using OpenAM (for its container based policy agents). But now I need to switch since I believe it doesn't support Heroku Celadon Cedar stack. What's the best way / tool to enforce authentication for cedar deployed applications?

    ITKE376,235 pointsBadges:
  • Are reversibly encrypted passwords safe?

    I've noticed that in my event log, I keep getting this message when my router tries to use Radius for authentication. """The user could not be authenticated using Challenge Handshake Authentication Protocol (CHAP). A reversibly encrypted password does not exist for this user account. To ensure that...

    ITKE376,235 pointsBadges:
  • How does Google Authenticator work?

    I'm pretty new to Google Authenticator but I understand it's an alternative to SMS for 2Step verification. But the part I don't understand is that how is it possible that it works without connectivity? How can the server and mobile phone sync together to know which code is valid? I would appreciate...

    ITKE376,235 pointsBadges:
  • Is WEP shared key authentication secure?

    I'm pretty new to the security field and I've been reading up on wireless authentication / shared key authentication. It doesn't sound very secure to me. Basically, here's what I figured out: The station sends an authentication request to the access point. The access point sends challenge text to...

    ITKE376,235 pointsBadges:
  • What are the hardware requirements for implementing the FIDO U2F standard? Are there any issues with backwards compatibility?

    I'm thinking about revamping my personal OP-SEC in the near future but I need to make sure that the security token I get will be backwards compatible with the FIDO standard. Would anyone happen to know of what's required of hardware to implement FIDO U2F standard and if xNT is future-proof? Why...

    ITKE376,235 pointsBadges:
  • Is it ok to use a weak password as long as I have two-factor authentication?

    When it comes to passwords, I'm pretty strong. I never reuse passwords across sites and I try to use two-factor authentication when it's available. But I do realize that typing all those passwords is a problem. A good friend of mine asked me why I don't use a weak password when two-factor...

    ITKE376,235 pointsBadges:
  • My key fob system has been working fine. Is there any need to upgrade?

    I've noticed that my key fob system has been acting slowly but is still working pretty good. Should I upgrade or hold off?

    ITKE376,235 pointsBadges:
  • Are there any particular multifactor authentication issues to consider in the healthcare industry?

    A friend of mine is getting into the healthcare industry has some concerns, particularly when it comes to security. Are there any particular authentication issues that he needs to know about in the healthcare industry?

    ITKE376,235 pointsBadges:
  • How do I generate a Google application-specific password from a shell script?

    I've recently enabled two-factor authentication on Google, but no my Google export scripts aren't working. My computer is verified and trusted but, for some reason, the scripts are not. Basically, every time the CRON job is run, I keep getting this 'Google verification code' and the script fails....

    ITKE376,235 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.