Top 10 Applications for Multi-Factor Authentication in Higher Education
Strong, multi-factor authentication is one of the most cost efficient ways to reduce security threats within an organization. Although many organizations are hesitant to introduce strong authentication...
View ArticleCloud IAM Q & A w/ Mike Schwartz
What Exactly is Identity Federation? These days, most websites and mobile apps don’t know how to authenticate you. Instead, they call the APIs of services offered by popular “Identity Providers” or...
View ArticleHow & Why Gluu’s open source authorization and authentication platform was...
Today, services like authorization and authentication are delivered via APIs: JSON / REST HTTP “endpoints.” Some of the most popular authentication API’s on the Internet are using different profiles of...
View ArticleOAuth vs. OpenID – What’s the difference?
First of all, saying either OAuth or OpenID is not specific enough. There are at least three versions of both. The IETF OAuth standard is OAuth 2.0, and is an authorization standard. However, you could...
View ArticleFive Interceptions of the OX OP
Gluu has designed OX to be very flexible. OX admins can use Jython scripts to customize behavior. Jython was chosen because an interpreted language facilitates dynamic creation of business logic, and...
View ArticleGluu Federation Registry Service
Using the Gluu Server, your organization can host a local federation. Watch the video Gluu Multi-Party SAML Federation Demo: OX Open Source if you’d like to see more. But this approach to managing a...
View ArticleGluu’s IDnext 2013 Novay Digital Identity Award Submission
We will be attending IDNext 2013 in the Netherlands and decided to submit our OX open source software platform for consideration for the 2013 Novay Digital Identity Award. Check out a full list of the...
View ArticleGluu OSCON Submission
Title: Meet OX : OAuth2 Authentication and API Security Description (400 char): Provide a historical overview of domain authentication services like RADIUS, LDAP, Kerberos and PKI. Review SAML...
View Article17 Recommended Requirements for an Identity and Access Management POC
We get requests for POC’s quite often. In an attempt to provide tactical guidance to organizations developing an identity and access management POC, the following are our top recommended criteria for...
View Article2FA like Google with Casa
tl;dr Use our newest application, Casa to roll out self-service 2FA for OTP, FIDO, mobile-push and more. According to Verizon’s 2017 Data Breach Investigations Report, 81% of hacking-related breaches...
View ArticleTwo-Factor Authentication (2FA) best practices
Two-factor authentication (2FA) is hands-down the best way to increase online account security. It’s also true tighter security typically results in less convenience. Few things are more inconvenient...
View ArticleIs Google’s account recovery process broken?
Recently I’ve been evaluating and documenting how Google performs account security. With 1 billion user accounts, Google needs to strike the right balance between security and usability: if the...
View ArticleNew Gluu IAM products!
We’re excited to announce several products the Gluu community can use to deliver an even better identity & access management (IAM) service for customers, partners and employees! See all our new...
View ArticleCloud native OpenID platform enables true horizontal scalability for the...
Austin TX, April 14th, 2020 — While some commercial authentication systems can perform millions of authentications per day, Gluu has shown that its open source identity platform, using Couchbase as...
View Article