• Is it possible to log out user from a web site if he is using basic authentication?

    Would it be possible to log out a user from our website if he/she is using basic authentication? I already know that killing a session isn't enough because once a user is authenticated, the request contains login information so the user is automatically logged in when they access the site again....

    ITKE376,180 pointsBadges:
  • How does changing your password every 90 days increase security?

    At my organization, I need to change my password every 90 days (and I've been as the company for several years). Is there a specific attack that this is guarding against? Or is it just because "it's the way that it's always been done?" I feel like the only time I should change my password is when...

    ITKE376,180 pointsBadges:
  • Do mobile networks use encryption on SMS when used for two-factor authentication?

    I understand that a ton of two-factor authentication mechanisms use SMS to deliver single-use passphrase to a user. But I'm looking to find out how secure it truly is. Would it be hard to intercept the SMS message containing the passphrase? Do any mobile networks use some kind of encryption on SMS?...

    ITKE376,180 pointsBadges:
  • What are the benefits of federated identity management over public key encryption?

    I just started at a security company and I'm looking to find out if it's better to have a federated identity system (OpenID) instead of a public key encryption. Can anybody explain the benefits of having a federated identity management system? I would appreciate any advice.

    ITKE376,180 pointsBadges:
  • What’s the best practice to generate random/unique tokens of custom length?

    I'm trying to create an identifier for forgot password. I've tried using a timestamp with mt_rand() but the timestamp isn't unique every time. Is there something I'm missing here? What's the best way to generate random tokens of custom length? Thank you.

    ITKE376,180 pointsBadges:
  • What is the difference between shared key and pre-shared key authentication?

    I'm sorry for the 'homework-type question' but does shared key and pre-shared key mean the same thing in terms of authentication? Does pre-shared mean that it's already been shared by different parties? Thank you for the help.

    ITKE376,180 pointsBadges:
  • How do I implement Single Sign-On in a Java application?

    I've started working with Java applications and I'm trying to implement a single sign-on and federation in my application. Basically, I want to implement claims aware application in Java. What's the best way to do that?

    ITKE376,180 pointsBadges:
  • How do I create a one-time password generator for a phone?

    Over the past few weeks, I've been trying to make a one-time password generator for a phone. In the RFC2289, it says I must fold the output of the MD5. I've been using bouncy castle MD5 and I'm having issues on how to fold the byte array output. Here's what I have so far: for (int i = 0; i < 8;...

    ITKE376,180 pointsBadges:
  • What is the difference between Federated Identity and Single Sign On authentication methods?

    Can anyone explain the difference between federated login and single sign-on authentication methods? Thank you very much.

    ITKE376,180 pointsBadges:
  • How do I authenticate a user from a client application while using the ASP.NET Web API?

    I'm looking to authenticate several users from a client application using ASP.NET Web API. I understand that the "Authorize" attribute correctly returns a 401 unauthorized status. But I need to know how to allow our users to login to the API. Thanks so much!

    ITKE376,180 pointsBadges:
  • How can I validate a username and password against Active Directory?

    Is there a way I can validate my friend's username and password against Active Directory? I'm trying to see if his username / password are correct. Thanks!

    ITKE376,180 pointsBadges:
  • How can I implement Google Authenticator in .NET apps?

    I'm trying to implement Google Authenticator in .NET apps...is there a tutorial on how to do this? I'm trying to add tw0-factor authentication to several of my applications and I heard this is the way to do it. I would appreciate the help.

    ITKE376,180 pointsBadges:
  • Windows Server 2003 schedule task could not run

    We run a schedule task on our 2003 server. The task to execute a program runs for 1 day only. The next day the task shows "could not start" and after reentering the password for authentication it would start again for another day. I know its not an authentication problem due to the task run all day...

    Kak5 pointsBadges:
  • SOAP service authentication in Microsoft Silverlight

    The SOAP Service is authenticated, whenever I'm trying to execute my SilverLight application, it shows the authentication window. I even tried the below method to pass the credentials but it does not work can anyone help with that, its making big issue. BasicHttpBinding AdminService_Binding = new...

    VictorSagayaraj5 pointsBadges:
  • Radius Authentication of Wireless APs

    I have several wireless access points that I want to deploy in our organization. I have a windows domain and Active Directory 2003 and I want the authentication to be this way. Can anyone advice me on what radius server I can use and what kind of wireless security to configure, and the basic steps...

    JuneC155 pointsBadges:
  • Password complexity validation program

    Is anybody have the password complexity validation program ,which can force user to use special characters in password?

    Vinay40055 pointsBadges:
  • Alternative to using LSA?

    Hi All, I am integrating AD authentication into a software module that I have built but I am having problems. The software runs on an embedded image of Windows, which doesn't support LSA (Local Security Authority). Is there an alternative subsystem to using LSA? I have been reading up on other...

    SamCK25 pointsBadges:
  • Identify 802.1x clients in an AD domain

    I'm designing an 802.1x wired deployment with MAC Authentication Bypass for Windows workstations without the 802.1x client. I need to identify which workstations have the client and which do not. I also need to configure the 802.1x client on the workstations that do have it. The 802.1x client is...

    Peterp270 pointsBadges:
  • Citrix MetaFrame Login – Credential Validation Error

    I am new to Citrix Metaframe. Recently I had a virus attack and My Citrix server crushed. I have re-installed all the necessary services and also installed Citrix Metaframe 4.0. I have published applications on a myfarm and I can open then in Citrix program neighborhood. The problem comes when I...

    Sam19795 pointsBadges:
  • How to locally authenticate users using PPTP on a local PIX firewall

    I need to locally authenticate users using Point-to-Point Tunneling Protocol (PPTP) on a local PIX firewall. Once the users have authenticated, I need them to connect to a Windows 2003 server which is hosted at a remote location securely with encryption or some sort of tunnel. I have already got...

    NetworkingATE1,545 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.