Skip to main content

The WiKID Blog

The WiKID Blog, musings on two-factor authentication, information security and some other stuff.

Free two-factor authentication from WiKID

Today we announced our 4.0 release of the WiKID Strong Authentication server.  This release includes a much easier way to configure your WiKID server.  You can edit a sample configuration file with all your WiKID server and network information and use it to build your server in one step. The configuration file contains about 15 pieces of basic information about your network and certificate information.  We've also released a certificate management system that better manages licensing.  It allows companies to manage their user base much more easily.  We have found that companies are increasing the ways they use two-factor authentication and increasing the number of users over time.

The big news is you can now use the Enterprise version of WiKID free for up to 5 users.  We've had the WiKID Community version free as in speach for some time, but the encryption libraries we use for the smart phone tokens and the RADIUS server plugin are licensed and could not be released. There are a number of smaller companies, non-profits and security-minded home-network sys admins that need two-factor authentication.  This is for them.  It also eliminates the need for a test or lab license.  We encourage customers to set up test labs! 

So, if you want to set up two-factor authentication or just play around with it, please download our server!

The weakest link in your supply chain may be passwords

From the Register. 

X2Go on Centos

I recently did a tutorial on how to add two-factor authentication to X2Go via pam-radius on Ubuntu.  I've been playing with X2go since then on CentOS. I've released the scripts that I used to create my X2Go virtual boxes on Github. In addition, since packer can output AMIs, we've released a public AMI of the output. It is ami-c854d7a0 (based on a Rightscale image).

Poodle post - catastrophic bug of the month

Wow, when will it stop?

Customer Service Reps & Two-factor authentication

Brian Krebs has a post on a small breach at Cox Communications where a single customer service rep had a password stolen via social engineering resulting in the loss of 52 records.  Imagine the luck:  52 out of millions of customers and one of them is Brian Krebs.  That's some luck.

Recent Posts







RSS / Atom