Posted by:
admin
15 years, 10 months ago
There is a lot of flexibility in WiKID. It can be daunting. Each WiKID token client supports multiple domains across multiple servers. This means that one token can replace all a users passwords if those services support WiKID. WiKID becomes like a key chain of hardware tokens.
Each user can have multiple tokens. So you can have a corporate PC client, a wireless client on your Blackberry and a home PC client. These tokens may have the same WiKID domains on them or not. The only way a user can establish a second token on the same domain, though, is with a valid passcode from the first token. (This requirement prevents a rogue admin from setting up tokens without the user’s knowledge.)
Tokens can be wired or wireless. We support both a PC-based token client (Windows, Mac and Linux) and wireless (Blackberry, Palm, J2ME, PocketPC), or both as mentioned above.
Users can be set up automatically or manually. WiKID is unique among two-factor authentication systems in that users can be completely set up without an administrator’s assistance. Users can also be validated manually and re-validated immediately by an administrator.
Each domain can have its own security requirements. Minimum PIN length, passcode lifetime, max bad PIN attempts before lock-out and max bad passcode attempts can all be configured by the administrator.
WiKID is open source and commercial. As a free, open source solution WiKID makes sense for services that typically only require a password for security because WiKID is easier for end-users (who only have to remember a PIN) and far more secure. Yet, authentication is a very key element of network security, so support services and commercial add-ons are important too. Share on Twitter Share on Facebook
Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)