Scenario: The Future of Authentication - 70341

Report Details

A number of significant trends are causing the authentication (AuthN) and authorization (AuthZ) architectures and technologies to significantly change.

Cloud, mobile and Social computing combined (The Computing Troika) are causing an identity explosion that is requiring organizations to embrace and evangelize authenticated access to any resource by anyone from any device.

At the same time, organizations are being required to address this more complex and demanding authentication environment with fewer resources and to do so more efficiently.

In short, the traditional point-to-point Federated Identity architecture is now obsolete. Organizations are required to move beyond Federation with centralized and single Identity Provider (IdP) designs to a Hybrid that is both distributed and multi-centered.

Organizations need to embrace the API Economy authentication mandates by allowing multiple types of entities to have authentication and authorization to information and resources. In this context, the word “entity” is used to describe possibilities that go beyond people. An entity can be another service, or an application, or an organization or a device. The multiple entity type of the API Economy needs to be able to authenticate independently for its own purposes or on behalf of another or others. “Another” can be described as any other single entity and “others” can be multiple entities.

Finally both traditional authentication standards and the new web-friendly standards are merging together in this Hybrid environment to address the multifaceted needs of the future of authentication.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Aug 09, 2012

Scenario: The Future of Authentication - 70341

A number of significant trends are causing the authentication (AuthN) and authorization (AuthZ) architectures and technologies to significantly change. Cloud, mobile and Social computing combined (The Computing Troika) are causing an identity explosion that is requiring organizations to…

€995.00 Get Access
Mastercard Visa PayPal Invoice

Latest Related Reports

Executive View

Executive View: Telekom Magenta Security - 70342

Unter der Bezeichnung Magenta Security werden alle Angebote für  Dienstleistungen und Managed Services des Telekom - Konzerns gebündelt. Magenta Security liefert ein sehr umfassendes Portfolio an Dienstleistungen und  zählt damit zu den ersten Adressen für…

Executive View

Executive View: Signicat - 72537

Signicat offers cloud-based services for secure access to applications, identity proofing, electronic signing, and long-time archiving of signed and sealed documents. Recently, their portfolio has been expanded to include a mobile authentication product to help customers meet PSD2 requirements.

Executive View

Executive View: IdentityX® from Daon - 71312

Daon’s IdentityX® authentication platform is a universal mobile authentication framework that combines modern standard-based biometric technologies with broad support for legacy authentication systems to provide a flexible, frictionless and future-proof solution for managing risk,…

Executive View

Executive View: Nok Nok Labs S3 Authentication Suite - 71261

Nok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary innovations. The S3 Authentication Suite provides a full stack of client- and server-side technologies for…

Executive View

Executive View: LSE LinOTP - 71452

LSE LinOTP is a standards-based, open source solution that provides token and SMS-based Multi-Factor Authentication by integrating with existing authentication challenge schemes. LinOTP provides strong authentication to hosted web and mobile applications, as well as non-web based protected…

Advisory Note

Advisory Note: Trends in Authentication and Authorization - 71043

How authentication and authorization have to change in the days of the Computing Troika (Cloud Computing, Mobile Computing, Social Computing), the API Economy, and the New ABC: Agile Businesses – Connected.

Executive View

Executive View: SecureKey briidge.net™ - 71016

SecureKey Technologies provides cloud-based, trusted identity networks that enable organizations to deliver online services securely to consumers. SecureKey offers a suite of cloud based services for consumer and citizen authentication under the trademarked name of briidge.net™. There…

Executive View

Executive View: RSA Adaptive Authentication - 70889

Adaptive Authentication uses risk-based policies to evaluate a user’s login and post-login activities against a range of risk indicators. Systems then ask for additional assurance of the users’ identities when a risk score or policy rules are violated. This risk and…

Advisory Note

Advisory Note: Strong Authentication - 70261

This research note provides a comprehensive overview about authentication technologies available today. Strong authentication is a challenge for most organizations. However, selecting the appropriate strong authentication mechanism(s) is a difficult decision. This research note provides…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

GDPR vs. PSD2: why the European Commission must eliminate screen scraping

The General Data Protection Regulation (GDPR) and Revised Payment Service Directive (PSD2) are two of the most important and most talked about technical legislative actions to arise in recent years.  Both emanate from the European Commission, and both are aimed at consumer protection. GDPR [...]

Latest Insights

Hot Topics

Spotlight

Connected Consumer Learn more

Connected Consumer

When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00