Scenario: The Future of Authentication - 70341

Report Details

A number of significant trends are causing the authentication (AuthN) and authorization (AuthZ) architectures and technologies to significantly change.

Cloud, mobile and Social computing combined (The Computing Troika) are causing an identity explosion that is requiring organizations to embrace and evangelize authenticated access to any resource by anyone from any device.

At the same time, organizations are being required to address this more complex and demanding authentication environment with fewer resources and to do so more efficiently.

In short, the traditional point-to-point Federated Identity architecture is now obsolete. Organizations are required to move beyond Federation with centralized and single Identity Provider (IdP) designs to a Hybrid that is both distributed and multi-centered.

Organizations need to embrace the API Economy authentication mandates by allowing multiple types of entities to have authentication and authorization to information and resources. In this context, the word “entity” is used to describe possibilities that go beyond people. An entity can be another service, or an application, or an organization or a device. The multiple entity type of the API Economy needs to be able to authenticate independently for its own purposes or on behalf of another or others. “Another” can be described as any other single entity and “others” can be multiple entities.

Finally both traditional authentication standards and the new web-friendly standards are merging together in this Hybrid environment to address the multifaceted needs of the future of authentication.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Aug 09, 2012

Scenario: The Future of Authentication - 70341

A number of significant trends are causing the authentication (AuthN) and authorization (AuthZ) architectures and technologies to significantly change. Cloud, mobile and Social computing combined (The Computing Troika) are causing an identity explosion that is requiring organizations to…

€995.00 Get Access

Latest Related Reports

Executive View

Executive View: Nok Nok Labs S3 Authentication Suite - 71261

Nok Nok Labs S3 Authentication Suite is a unified strong authentication platform that incorporates FIDO Alliance specifications and other industry standards, as well as proprietary innovations. The S3 Authentication Suite provides a full stack of client- and server-side technologies for…

Executive View

Executive View: LSE LinOTP - 71452

LSE LinOTP is a standards-based, open source solution that provides token and SMS-based Multi-Factor Authentication by integrating with existing authentication challenge schemes. LinOTP provides strong authentication to hosted web and mobile applications, as well as non-web based protected…

Advisory Note

Advisory Note: Trends in Authentication and Authorization - 71043

How authentication and authorization have to change in the days of the Computing Troika (Cloud Computing, Mobile Computing, Social Computing), the API Economy, and the New ABC: Agile Businesses – Connected.

Executive View

Executive View: SecureKey briidge.net™ - 71016

SecureKey Technologies provides cloud-based, trusted identity networks that enable organizations to deliver online services securely to consumers. SecureKey offers a suite of cloud based services for consumer and citizen authentication under the trademarked name of briidge.net™. There…

Executive View

Executive View: RSA Adaptive Authentication - 70889

Adaptive Authentication uses risk-based policies to evaluate a user’s login and post-login activities against a range of risk indicators. Systems then ask for additional assurance of the users’ identities when a risk score or policy rules are violated. This risk and…

Advisory Note

Advisory Note: Strong Authentication - 70261

This research note provides a comprehensive overview about authentication technologies available today. Strong authentication is a challenge for most organizations. However, selecting the appropriate strong authentication mechanism(s) is a difficult decision. This research note provides…

Executive View

Snapshot: Thales SafeSign Authentication Suite - 70383

Thales SafeSign is a set of stand-alone modules that comprises the full feature-set of so called Versatile Authentication Servers or Platforms (VAS or VAP). It can be deployed as authentication server for token and mobile based One Time Password (OTP), Challenge and Response, EMV/CAP and…

Advisory Note

Market Overview Strong Authentication

For companies and their employees as well as for online-services and their customers respectively, authentication with username and password are no longer considered bearable. The multitude of user accounts and the increasing complexity that passwords are expected to have, simply brought…

Advisory Note

Technology Report: Strong authentication for user-centric Identity Management

Currently, there is a lot of work done around user-centric identity management. But until now, there is a lack of strong authentication in that area – even while there are several existing approaches which can be used and even while there are many potential identity providers. Despite…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Latest Insights

Hot Topics

Spotlight

Learn more

Cyber Defence Center

Today, the Cyber Defence Center (CDC) or Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00