All Research
Advisory Note
Authentication is a core component of Identity and Access Management (IAM) Solutions and central to the security and management of modern organizations. For many years, the industry has been developing protocols that offer secure authentication beyond basic username and passwords. Digital transformation has increased the need for robust standards that can work with remote working, multi-cloud environments, IoT, APIs and DevOps.

1 Introduction

Authentication is a core component of Identity and Access Management (IAM). It has been a leading area of research and product development for decades because basic legacy username/password-based authentication systems are inherently insecure and suffer from usability issues. Password resets are expensive, too.

Various annual surveys show that password compromises are associated with between 70-80% of data breaches while user surveys consistently show that >75% of users want non-password alternatives. For years, security practitioners have advocated for the use of “stronger” passwords in an attempt to thwart the growing problem of compromised passwords. Increasing the length of passwords, adding special characters, and recommending the use of phrases instead of words have been common tactics. However, these do not overcome the user centric problems of having to remember passwords and navigate numerous logins. And all the while password cracking tools used by hackers are evolving.

Strong authentication is usually defined as a combination of at least two of the following factors: something you have, something you know, or something you are. For situations demanding better security, 2-factor cryptographic-based devices such as smartcards and hardware tokens have been used, particularly for enterprise solutions. However, these can suffer from usability and account recovery issues. Occasionally 2-factor authentication systems are broken when the underlying cryptography is broken. Two-factor authentication systems are also generally more expensive, and thus not economically practical for many consumer-facing scenarios, but better for enterprises.

Two-factor and MFA methods have strengths and weaknesses and can adhere to relevant standards. Vendors of IAM and Privileged Access Management (PAM) solutions and Identity providers will use some or all of these with varying levels of success. To understand how identity management works within an organization it is useful to understand how widely used authentication protocols work within an access management architecture to ensure that users and entities access the resources they need to get work done. Finally, selecting appropriate authentication solutions requires understanding business and regulatory requirements as well as current and to-be security portfolios and architectures.

Full article is available for registered users with free trial access or paid subscription.
Log in
Register and read on!
Create an account and buy Professional package, to access this and 600+ other in-depth and up-to-date insights
Register your account to start 30 days of free trial access
Get premium access
Choose a package

Stay up to date

Subscribe for a newsletter to receive updates on newest events, insights and research.
I have read and agree to the Privacy Policy
I have read and agree to the Terms of Use