Skip to main content

The WiKID Blog

The WiKID Blog, musings on two-factor authentication, information security and some other stuff.

PCI Compliance

If you are using the WiKID Strong Authentication System to meet the PCI-DSS requirement for two-factor authentication, you should upgrade to the latest version of the server.  We have a couple of fixes that popped in a scan.  See the Changelogs.  In particular, build 3.5.0-b1411 disabled unnecessary HTTP methods and 3.5.0-b1403 removed weak SSL ciphers from the WiKIDAdmin.

Using the WiKID API in your two-factor authentication roll-out

Time to get down to business with the wAuth API. The API exposes all the key functionality of the WiKID server allowing you to automate many typical two-factor authentication tasks and push functionality to the appropriate parties, such as the corporate helpdesk or HR. In this series of blog posts, I'll show you how to create the communication channel, register users and authenticate an one-time passcode. For our example, we will be setting up a CSR application in Java on a box with the IP address of 192.168.1.10. The WiKID server has an internal IP of 192.168.1.20 and an external IP of 174.129.6.100. So, the zero-padded domain identifier for the WiKID server is 174129006100. For demonstration purposes, our CSR application will be a tomcat JSP on linux in a directory called /opt/tomcat/webapps/CSR. I assume that this application will be protected by existing credentials appropriate for this level of securing and granting access.

WiKID's two-factor authentication API

We're kicking off a series of posts discussing our API and how to use it to make your two-factor authentication roll-out hassle-free. Most of our customers use the API if only via some of the scripts we provide. For example, we provide a sample script that allows users to register their own software tokens after validating via their Active Directory credentials. But the API is capable of much more than that. It was developed over time based on feedback from a number of our Enterprise and SaaS customers. In particular, our SaaS customers needed secure multi-tenant user management tools that allowed them to push user control to their customer and that minimized costs.

Two-factor authentication for twitter

New Drupal two-factor module released - CMS authentication issues

WiKID is pleased to annouce the release of a two-factor authentication module for Drupal.

Recent Posts

Archive

2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom