Authentication for the Cloud



This outfit’s patented TrustInside authentication technology does away with transmitting and storing passwords by using a randomised challenge-based system.

authentication is a process in which the credentials provided are compared to those on file in a database of authorised users’ information on a local operating system or within an authentication server. If the credentials match, the process is completed and the user is granted authorization for access. The permissions and folders returned define both the environment the user sees and the way he can interact with it, including hours of access and other rights such as the amount of allocated storage space.

Cloud computing is changing the way we interact with devices, software, data and processes. But some things never change, and one thing that remains true across the old and new computing paradigms is the importance of authentication to confirm the identity of the user and/or system with which we’re communicating.
Identity management and authentication form the basis for security whether in the cloud or on the local network. Managing identities have been enough of a challenge within the corporate network, and became more so as businesses formed federations for the purpose of sharing resources across organisational lines. Private, public and hybrid clouds are adding yet another layer of complexity.

Comments

Popular Posts