Search results

13 items matching your search terms.
Filter the results.
Item type




























New items since



Sort by relevance · date (newest first) · alphabetically
FAQHow do I set up Mutual HTTPS Authentication?
Some tips and tricks to consider.
Located in Support / WiKID Documentation Center / FAQs
Manual PageHow to install the WiKID Strong Authentication Server - Enterprise Edition
How to install the Enterprise Version of WiKID's two-factor authentication server from networking to adding a user.
Located in Support / / Installation & API Manuals / How to install the WiKID Strong Authentication Server
Manual PageHow to install the WiKID Strong Authentication Server - Enterprise Edition - Page 3
How to install the Enterprise Version of WiKID's two-factor authentication server from networking to adding a user: creating an authentication domain.
Located in Support / / Installation & API Manuals / How to install the WiKID Strong Authentication Server
Manual PageCómo instalar el servidor de autenticación WiKID - Enterprise Edition
Cómo instalar el servidor de autenticación WiKID - Enterprise Edition
Located in Support / / Installation & API Manuals / Cómo instalar el servidor de autenticación WiKID - Enterprise Edition
Manual PageCómo instalar el servidor de autenticación WiKID - Enterprise Edition - Page 3
How to install the Enterprise Version of WiKID's two-factor authentication server from networking to adding a user: creating an authentication domain.
Located in Support / / Installation & API Manuals / Cómo instalar el servidor de autenticación WiKID - Enterprise Edition
These instructions are designed to help you configure and test using the WiKID TACACS+ protocol module via Linux PAM on Red Hat. This document has been updated to cover pam .99 and higher. We assume that you have already installed the open-source WiKID Strong Authentication Server Community Edition.
Located in Support / WiKID Documentation Center / Links
The WiKID Strong Authentication Server is a dual-source two-factor authentication system. PINs are encrypted on a software token and sent to the WiKID server. If the PIN is correct, the encryption valid and the account active, a one-time password is generated, encrypted and returned to the user's token where it is decrypted and presented for use with a network-based services. While there are a number of tutorials on how to combine WiKID's two-factor system a variety of systems (such as SSH, OpenVPN, Apache and SSL-VPNs), this is the first to address how to install the WiKID Server. We assume that you have already configured an RPM-based server. In general, it is best to have WiKID be the only service running on the server. This configuration will minimize potential security risks.
Located in Support / WiKID Documentation Center / Links
In this example, I am installing Freeradius on Fedora Core 7 and running the 3.0RC2 rpms of WiKID on Centos5 (however, the same instructions will work for the 2.0 version of WiKID.) We'll be testing with SSH, however, the same setup should work for Apache, WebDAV, OpenVPN, and any other application that supports PAM.
Located in Support / WiKID Documentation Center / Links
SSH offers a highly secure channel for remote administration of servers. However, if you face an audit for regulatory or business requirements, such as Visa/Mastercard PCI, you need to be aware of some potential authentication related short-comings that may cause headaches in an audit
Located in Support / WiKID Documentation Center / Links
In the last month I bought a 2-Factor Authentication system from Wikidsystems.com and have set it up as my authentication mechanism for my monowall-terminated PPTP VPN.
Located in Support / WiKID Documentation Center / Links
Join our email list
How do I add two-factor auth?

Download a registration-free free eGuide on How to Add Two-factor Authentication to Your Network, complete with examples.

    Thanks for responding so fast! Great service.

    INFOSEC PRO
    SAN DIEGO, USA