Posts

Showing posts from December, 2020

IAM And its Products

Image
Identity and access management or IAM is a security network framework that is designed for verification of identities for the management of electronic and digital identities. It is an authentication process of the IT sector that helps to keep track and check on the access grant permission of users to critical information. The working mechanism of IAM includes - single sign-on systems, two-factor authentication, multi-factor authentication, and privileged access management. This security system helps the users to keep a record of securely stored identity and profile data.  Having a look at the security systems getting trespassed, IAM was introduced as it has a lot of verification components for users to go through which henceforth makes sure no one gets the permission to the information without providing their significant credentials and without showing their proper identities. Additionally,  IAM has a lot of other features as well, namely - biometrics, behavior analytics, and AI.  The

PUBLIC KEYS DO NOT GUARANTEE FULL SECURITY OF SSH SETUP

Image
SSH keys or Secure Shell keys are the set of key pairs that allow the user to modify and control their remote servers. It is a security protocol system that makes sure no outsider trespasses the networking system, as there have been crimes reported where hackers had assessed the server systems and misused the information.  It is a client-server based security system that works on the authentication of passwords and identities. This protocol shields up thousands of authentication methods. It works on the authentication and authorization as commands sent by the client to the host and later revert back on them to the client.  As mentioned above SSH keys work on a pair of two keys namely - Public Key and a Private Key. Though it is said that SSH protocol is one of the best security measures but still it is somewhere believed that public key is not enough for SSH security, and this is so because there’s a file stored as a backup in the user system which can be used by the intruders to acce

RADIUS SERVER - IT’S HISTORY AND FUTURE

Image
Remote Authentication Dial-In User Service ( RADIUS Server ) is an authentication system that works on the protocol of remote users. It is a client-based networking server that runs on the basis of application layers. Its prime function is to build a core connection of user identities working on a network platform so that no outsider can intrude on the server. The main purpose of RADIUS Server is to determine whether a user can get access to a remote server on the basis of their identity, cause permission to enter the network portfolio is only allowed to the unregistered identities and users. RADIUS protocol uses RADIUS Server and RADIUS Client for its function. RADIUS Client is more like a networking device that is used for authentication whereas RADIUS Server is a background process that runs on the network. A RADIUS Server has a lot of components, which ultimately build up the structure of the security system, and its components are as follows - Supplicant : It is actually an insta