Evidian Self-Service Password Reset

Total Page:16

File Type:pdf, Size:1020Kb

Evidian Self-Service Password Reset Evidian Self-Service password reset Trusted partner for your Digital Journey Because one security measure doesn’t fit all situations One help desk call for a password reset costs around 15 euros and is time-consuming (about 20 minutes). Three to four password resets are performed per employee and year (According to the Gartner Research - Note T-15-6454). A self-service password reset reduces this cost and frees up your IT. Evidian Self-Service Password Reset offers several different authentication methods. From a web portal or from their workstation, users can securely reset their Windows passwords without having to contact the helpdesk. Evidian Self-Service Password Reset is also available in offline mode. Evidian Self-Service Password Reset (SSPR) identifies the user with different means: Questions and Answers, Scan of a QR Code, Confirmation code sent via email or SMS, Push notification on mobile and subsequently executes the reset of a new password or generates a temporary password (TPA). Evidian Self-Service Password Reset Strong password policy enforcement It fits perfectly into digital workplaces with features enable users to change their with Evidian Self Service Password Reset a large range of terminals as well as on Windows password securely (network Evidian SSPR can enforce a strong VDI infrastructure (Citrix XenApp, Windows login, Windows login), connected or not password policy for the network login. You RDS and VMware). connected to the network. The solution can define the network login password provides a large range of authentication format such as the type of characters as Identity proofing methods and full audit trails to well as their position, the minimum and Questions & Answers mechanism can also demonstrate the implementation of the maximum number of characters, etc… be used to identify the user. password policy. This policy can be different regarding who From the web portal, users can generate a is resetting the Windows password. one-time code that can be verified by an administrator. Evidian Self-Service password reset Full audit trail of network login access Evidian primary password management and password change with Evidian Self features manage the expiration and the reset of the Windows password according Service Password Reset to the password policy. The solution provides a full audit trail of Notification mails are sent before password WHO has access to WHAT, WHEN and expiration to help the user manage from WHERE. Reports can be generated By enabling One-Time Password his Windows password and when the based on these audit trails. verifications via mobile, SMS and Windows password is changed. These reports can help demonstrate that e-mail for identity verification, your password change policy is effectively organizations are able to increase A large range of Self-Service Password implemented. They can also be used to end-user adoption rates of Self- Reset authentication methods: prove the return on investment. Service Password Reset up to 98%. • Answering pre-defined questions with Reporting features can also be used to or without an available network and detect accounts which the Windows without contacting of the help desk. password has not been changed for a while (risky/useless Windows account). • Scanning a QR Code with Evidian QRentry App with or without an Use your company’s existing LDAP/Active 3 reasons to manage passwords with available network and without the Directory infrastructure Evidian Self-Service Password Reset: help desk (no network connectivity is required from the mobile). Evidian SSPR relies on your existing 1. Free your IT from “Password reset” Active Directory. Thus, you do not need time cost • Using a one-time password sent via to synchronize identities, once installed email without involving the help desk all employees can benefit from the SSPR 2. Fully integrated to your Microsoft (network required). feature. All the Evidian security data is environment, with an intuitive user • Using a one-time password sent via encrypted and stored in your company interface directory: Active Directory or AD LDS. SMS without involving the help desk 3. Facilitate your multi-factor (network required). authentication deployment by From the login screen and a web portal • Validating a notification received on offering a user-friendly fallback. Evidian Self-Service Windows password the user’s mobile without involving the reset is available from a web portal help desk (network required). and from the login screen of the user’s • Using a challenge response workstation. mechanism when the reset password The solution is easy to deploy and is is used. compatible with managed services. 2 Self-Service password reset Evidian Enterprise SSO (E-SSO) main features Identity proofing Enterprise SSO is certified Citrix-Ready. Business-oriented functions A non-intrusive solution Several other solutions have been certified With Evidian Authentication Manager, sales too, you can find them on the Evidian Web You will not need to modify any of your teams and branch office employees can site. applications. Evidian Enterprise SSO share a kiosk PC. They can switch to their activates single sign-on in many types own environment in a matter of seconds, Convergence with remote accesses for of applications: Windows, web, terminal without having to close then open a BYODs and non- managed devices emulator, etc. Windows session. With Web Access Manager, Single Sign- When doctors make rounds in a hospital A universal solution On is extended to non-managed devices. their session moves with them. They This spares you from installing agents Evidian Enterprise SSO can be run access it by tapping their radio badge or on devices and exposing application from Windows, Mac OS, Android, iOS, presenting a smart card. passwords outside your internal network. on smartphone, tablet, server, virtual Furthermore, it enables PC, tablet, environment such as Citrix, Vmware or smartphone accessing Cloud applications Traders in front office or back office Microsoft, from standard and thin client. using identity federation through standard working with a cluster of PCs can with a Password vault, credentials, personal protocols such as OAUTH, OpenID single authentication, they can lock, unlock, notes and single sign-on are always secure Connect, SAMLv2. and delegate that cluster – fully or partially, and available for the user and from any permanently or temporarily. terminal. Strong authentication Ensure that your information system Evidian Authentication Manager reinforces Password-free access to your mobile is compliant with your policy and applications and manages strong authentication for Windows with smartcards or cryptographic regulations With Evidian Enterprise SSO for Mobile USB tokens, hard or soft OTP, biometrics, You can monitor your employees’ device, Evidian delivers an Android SSO RFID badges, smartphone with QRentry, attempts to access applications and PCs. and iOS SSO solution that extends its etc. All accesses will be audited by name, Enterprise Single Sign-On offer. Enterprise including accesses to Windows accounts SSO for mobile devices automatically Self-service Password Reset and generic applications. This will enable enters application passwords for you, you to demonstrate that your access A Self-Service Password request (SSPR) stores securely personal notes and policy is observed and fulfills its objectives. passwords in your mobile password function allows users who have forgotten their Windows password, or their access Evidian Enterprise SSO embeds a reporting vault, this information is securely stored module allowing dashboard generation on on-premises or in a Cloud and is available card, to unlock their accesses - even offline, with or without contacting the helpdesk. key indicators such as: activity, snapshot, from your workstation and your mobile risk, surveillance and KPIs. Reports can be devices. Emergency Access for the Windows uploaded to authorized users. Turn your mobile device into a strong session authentication device With Self-Service Password Request, users When you activate your mobile device can unlock their access themselves with with a QR Code, it becomes a secure an emergency procedure, available online access point to your enterprise network. and offline, in self-service mode. The authentication on your mobile device grants you a secure access to your applications. Easy deployment in your existing infrastructure Evidian Enterprise SSO collects user passwords so they do not need to be redefined. It can also be associated with an existing provisioning system. You can start with only one department and then deploy SSO later on thousands of devices. Evidian Enterprise SSO is based on an LDAP, Active Directory or AD LDS directory. No additional hardware is required. Eliminate use of passwords for remote users. Users, either internal or external, often have remote access to applications running in virtualized environment. Evidian Enterprise SSO frees these users from memorizing and typing passwords for these virtualized applications. For instance Evidian Self-Service password reset 3 Factsheet About Atos Atos is a global leader in digital transformation with approximately 100,000 employees in 73 countries and annual revenue of around € 13 billion. The European number one in Big Data, Cybersecurity, High Performance Computing and Digital Workplace, The Group provides Cloud services, Infrastructure & Data Management, Business & Platform solutions, as well as transactional services through Worldline,
Recommended publications
  • Passwordless Authentication: How Giving up Your Password Might Make You More Secure
    thalesgroup.com Passwordless Authentication: How Giving Up Your Password Might Make You More Secure White Paper Why Passwords Are Bad Passwords are one of the oldest security tools in the world of software and the internet. But in today’s environment, passwords cannot provide enough protection for businesses for several reasons. Password Fatigue Leads to Bad Hygiene Policy-driven password strengths and rotation leads to password fatigue, thereby contributing to poor password management. Verizon’s Data Breach Investigation Report1 indicates that over 70 percent of employees reuse passwords for work and personal accounts. A malicious actor could therefore abuse an employee’s credentials to access other applications and sensitive customer information. % out “123456” 81 ~40 4 of 5 “password” of breaches involve Average person People reuse same still among most use of weak or has roughly 40 passwords across popular password stolen credentials online accounts dierent accounts choices in 2018 People also tend to pick easy-to-hack passwords because of the trouble they have with remembering passwords. An analysis of over five million leaked passwords showed that 10 percent of people used one of the 25 worst passwords2. Seven percent of enterprise users had extremely weak passwords. Passwords Hurt User Experience Research by Carnegie Mellon University indicates that a properly written password policy can provide an organization with increased security. However, there is less accord over what should be in this policy to make it effective. To illustrate this fact, users commonly react to a policy rule that requires them to include numbers by picking the same number or by using the number in the same location in their passwords3.
    [Show full text]
  • Modern Password Security for System Designers What to Consider When Building a Password-Based Authentication System
    Modern password security for system designers What to consider when building a password-based authentication system By Ian Maddox and Kyle Moschetto, Google Cloud Solutions Architects This whitepaper describes and models modern password guidance and recommendations for the designers and engineers who create secure online applications. A related whitepaper, Password security ​ for users, offers guidance for end users. This whitepaper covers the wide range of options to consider ​ when building a password-based authentication system. It also establishes a set of user-focused recommendations for password policies and storage, including the balance of password strength and usability. The technology world has been trying to improve on the password since the early days of computing. Shared-knowledge authentication is problematic because information can fall into the wrong hands or be forgotten. The problem is magnified by systems that don't support real-world secure use cases and by the frequent decision of users to take shortcuts. According to a 2019 Yubico/Ponemon study, 69 percent of respondents admit to sharing passwords with ​ ​ their colleagues to access accounts. More than half of respondents (51 percent) reuse an average of five passwords across their business and personal accounts. Furthermore, two-factor authentication is not widely used, even though it adds protection beyond a username and password. Of the respondents, 67 percent don’t use any form of two-factor authentication in their personal life, and 55 percent don’t use it at work. Password systems often allow, or even encourage, users to use insecure passwords. Systems that allow only single-factor credentials and that implement ineffective security policies add to the problem.
    [Show full text]
  • The Tangled Web of Password Reuse
    The Tangled Web of Password Reuse Anupam Das∗, Joseph Bonneauy, Matthew Caesar∗, Nikita Borisov∗ and XiaoFeng Wangz ∗University of Illinois at Urbana-Champaign fdas17, caesar, [email protected] yPrinceton University [email protected] zIndiana University at Bloomington [email protected] Abstract—Today’s Internet services rely heavily on text-based password meters to help users understand the strength of their passwords for user authentication. The pervasiveness of these passwords. Studies have shown that password composition services coupled with the difficulty of remembering large numbers policies along with password meters (or verbal notifications) of secure passwords tempts users to reuse passwords at multiple do help users to choose stronger passwords [35], [44], [46]. sites. In this paper, we investigate for the first time how an However, they also increase user fatigue. attacker can leverage a known password from one site to more easily guess that user’s password at other sites. We study several Unfortunately, the number of passwords a user must re- hundred thousand leaked passwords from eleven web sites and member continues to increase, with typical Internet user es- conduct a user survey on password reuse; we estimate that 43- timated to have 25 distinct online accounts [10], [11], [32]. 51% of users reuse the same password across multiple sites. Because of this, users often reuse passwords across accounts We further identify a few simple tricks users often employ to on different online services. Password reuse introduces a secu- transform a basic password between sites which can be used by an attacker to make password guessing vastly easier. We develop the rity vulnerability as an attacker who is able to compromise one first cross-site password-guessing algorithm, which is able to guess service can compromise other services protected by the same 30% of transformed passwords within 100 attempts compared to password, reducing overall security to that of the weakest site.
    [Show full text]
  • Nfront Password Filter Documentation 2
    nFront Password Filter Multiple Policy Edition for Domain Controllers Single Policy Edition for Domain Controllers Single Policy Edition for Member Servers Multiple Policy Edition for Member Servers Desktop Edition Version 7.1.0 © 2000 – 2021 nFront Security. Documentation All Rights Reserved. nFront Security, the nFront Security logo and nFront Password Filter are trademarks of Altus Network Solutions, Inc. All other trademarks or registered trademarks are the property of their Copyright © 2021 nFront Security. All Rights Reserved. Contents 1.0 nFront Password Filter Overview ........................................................................... 2 1.1 Versions ................................................................................................................. 2 1.2 Compatibility and System Requirements ................................................................ 3 1.3 What’s New ............................................................................................................ 4 1.3 Notes to Evaluators ................................................................................................ 5 1.4 Overview of Features ............................................................................................. 7 1.4.1 The logic behind multiple policies (MPE version only) ................................................... 8 1.4.2 The Message Box for Rejected Passwords ...................................................................... 8 1.5 Information about your Evaluation Copy. ...............................................................
    [Show full text]
  • Security Controls and Best Practices for Financial Institutions Content I
    Security Controls and Best Practices for Financial Institutions Content I. Overview. 3 II. The Threat Landscape and Compliance . 4 III. Combating Compromised Credentials . 5 A. Password Security . 5 B. Enhanced MFA (EMFA). 6 C. Hardware Tokens (Business/Commercial Banking Only) . 6 IV. Combating Local Malicious Software and Phishing . 7 A. Trusteer’s Browser Security . 7 B. VeriSign Extended Validation Certificates . 7 C. RSA Fraud Shutdown . 7 D. Separation of Duty, Positive Pay, & Limits (Business/Commercial Banking Only). 7 E. Limits . 7 V. Alerting (Business Banking and Business Financial Services only) . 8 VI. Training & Best Practices . 8 VII. Action Plan . 10 VIII. Glossary . 11 Guidance Materials . 14 Additional Resources . 14 Overview The intent of this document is to inform Financial Institutions about the online fraud threats they currently face. For each threat we discuss, we will provide some basic guidance about an available control that could mitigate the threat. This guidance represents a starting point for improving security. Digital Insight strongly recommends that you review your current security plans and policies, make any updates necessary, and communicate improvements to your customers or members. The Threat Landscape and Compliance In order to commit online fraud, a fraudster simply needs to authenticate as the victim, using that victim’s online credentials. For environments that rely on Single Factor Authentication (something the user knows), the fraudster can coax this information from a real user through compelling On June 28, 2011, the phishing campaigns, key logging, or Man-in-the-Middle proxy attacks. FFIEC issued a Supplement to the Authentication in an Internet Banking For environments that have deployed Two Factor Authentication (something the user Environment guidance.
    [Show full text]
  • Draft NIST SP 800-118, Guide to Enterprise Password Management
    RETIRED DRAFT April 1, 2016 The attached DRAFT document (provided here for historical purposes): Draft NIST Special Publication (SP) 800-118, Guide to Enterprise Password Management (posted for public comment on April 21, 2009) has been RETIRED. Information on other NIST cybersecurity publications and programs can be found at: http://csrc.nist.gov/. The following information was originally posted with the attached DRAFT document: Apr. 21, 2009 SP 800-118 DRAFT Guide to Enterprise Password Management NIST announces that Draft Special Publication (SP) 800-118, Guide to Enterprise Password Management, has been released for public comment. SP 800-118 is intended to help organizations understand and mitigate common threats against their character-based passwords. The guide focuses on topics such as defining password policy requirements and selecting centralized and local password management solutions. NIST requests comments on draft SP 800-118 by May 29, 2009. Please submit comments to 800-118comments @nist.gov with "Comments SP 800-118" in the subject line. Special Publication 800-118 (Draft) Guide to Enterprise Password Management (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya NIST Special Publication 800-118 Guide to Enterprise Password (Draft) Management (Draft) Recommendations of the National Institute of Standards and Technology Karen Scarfone Murugiah Souppaya C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 April 2009 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Dr.
    [Show full text]
  • Protecting Passwords in the Event of a Password File Disclosure
    PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres New York University New York University [email protected] [email protected] Abstract—Over the years, we have witnessed various the plain-text passwords from disk. Salting inserts a random password-hash database breaches that have affected small and value that complicates the use of tables that allow hackers to large companies, with a diversity of users and budgets. The indus- immediately look up passwords to match most hashes. Storing try standard, salted hashing (and even key stretching), has proven passwords with a salted hash is widely considered to be the to be insufficient protection against attackers who now have access best practice because of the level of protection offered and to clusters of GPU-powered password crackers. Although there the ease of implementation (e.g., salted hashing requires no are various proposals for better securing password storage, most do not offer the same adoption model (software-only, server-side) additional hardware or client software). as salted hashing, which may impede adoption. However, storing passwords with a salted hash is not a In this paper, we present PolyPasswordHasher, a software- panacea. That is, when stored password data has been com- only, server-side password storage mechanism that requires min- promised, attackers have proven themselves adept at quickly imal additional work for the server, but exponentially increases cracking large numbers of passwords, even when salted- the attacker’s effort. PolyPasswordHasher uses a threshold cryp- password hashes comprise the stored data. For example, Troy tosystem to interrelate stored password data so that passwords Hunt, a security researcher, showed that cracking 60% of a cannot be individually cracked.
    [Show full text]
  • Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling
    Measuring the Security Impacts of Password Policies Using Cognitive Behavioral Agent-Based Modeling Vijay Kothari Jim Blythe Sean W. Smith Department of Computer Information Sciences Institute Department of Computer Science University of Southern Science Dartmouth College California Dartmouth College [email protected] [email protected] [email protected] Ross Koppel Department of Sociology University of Pennsylvania [email protected] ABSTRACT dash [1, 2], an agent-based simulation framework that Agent-based modeling can serve as a valuable asset to secu- supports the dual-process model of cognition, reactive plan- rity personnel who wish to better understand the security ning, modeling of human deficiencies (e.g., fatigue, frustra- landscape within their organization, especially as it relates tion), and multi-agent interactions, enables us to create such to user behavior and circumvention. In this paper, we ar- tools. In dash, users are represented as agents with weighted gue in favor of cognitive behavioral agent-based modeling goals, plans to achieve those goals, attributes, knowledge, for usable security and report on our work on developing and abilities. These agents use mental models and have an agent-based model for a password management scenario. perceptions of the world that often depart from reality. In We perform a number of trials and a sensitivity analysis that accordance with their mental models, they take actions, ob- provide valuable insights into improving security (e.g., an or- serve and interpret events, and communicate. They dynam- ganization that wishes to suppress one form of circumvention ically compute and recompute goals and the plans they use may want to endorse another form of circumvention).
    [Show full text]
  • Configuring Self Service Password Reset 21 Configuring Basic Settings
    Self Service Password Reset 4.4 Administration Guide April 2019 Legal Notice © Copyright 2018-2019 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors ("Micro Focus") are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. For additional information, such as certification-related notices and trademarks, see http://www.microocus.com/about/ legal/. 2 Contents About this Book 9 1 Self Service Password Reset Overview 11 Self Service Password Reset Key Features. .11 Self Service Password Reset Architecture . .12 Understanding Challenge-Response Storage Methods . .13 2 Getting Started 15 Logging in to the Administration Console. .15 Working with Configuration Editor . .16 Working with the Configuration Manager . .17 Using the Dashboard . .18 Configuring Macros for Messages and Actions . .19 3 Configuring Self Service Password Reset 21 Configuring Basic Settings . .21 Configuring Application Settings . .21 Configuring Localization Settings . .22 Configuring Session Management Settings . .22 Configuring the Telemetry Options . .22 Configuring Profiles. .23 Creating a Profile . .23 Managing Profiles . .24 Configuring Security Settings . .25 Configuring Security for Self Service Password Reset. .25 Configuring Web Security . .25 Importing Certificates to Create an HTTPS Connection to Browsers . 26 Configuring Intruder Detection . .27 Configuring External Web Services with REST . .27 4 Configuring LDAP Profiles and Settings 29 Configuring LDAP Directory Profile . .29 Configuring LDAP Settings .
    [Show full text]
  • Adselfservice Plus
    Solutions offered by ADSelfService Plus. Self-Service Password Endpoint Security One Identity Management Password policy enforcer and endpoint Enterprise single sign-on (SSO) and Self-service password reset and account multi-factor authentication (MFA). real-time password synchronizer. unlock. Password and account expiration notifier Download Now Highlights of self-service password management 1. Password self-service, anywhere, at any time: Enable users reset passwords and unlock accounts in office, at home, and on the move. 2. Password/account expiration notifer: Automate password and account expiration reminders to users via email, push, and SMS alerts. 3. Force password change: Force users to change their password at the next logon after a password reset by the help desk admin. Highlights of endpoint secuity 1. Endpoint MFA: Secure remote and local machine (Windows, macOS, and Linux), VPN, and OWA logons with advanced MFA techniques like biometrics or QR codes for local and remote access to network resources. 2. Custom password polices: Ensure strong user passwords across all their business accounts with advanced password policy settings. 3. Comply with regulatory mandates: Helps comply with NIST SP 800-63B, FFIEC, GDPR and HIPPA regulations. Highlights of one identity 1. Enterprise SSO: Allow users to access multiple enterprise applications with just one identity. 2. Real-time password sync: Synchronize Active Directory (AD) password resets and changes with connected enterprise applications in real time. Other highlights. 1. Directory Self-Update: Enable users to update their information like their phone number, email address, etc in AD. 2. Mail group subscription: Allow users to opt-in and opt-out of distribution groups.
    [Show full text]
  • Autopass: an Automatic Password Generator
    AutoPass: An Automatic Password Generator Fatma Al Maqbali and Chris J Mitchell Information Security Group, Royal Holloway, University of London [email protected], [email protected] March 9, 2017 Abstract Text password has long been the dominant user authentication technique and is used by large numbers of Internet services. If they fol- low recommended practice, users are faced with the almost insuperable problem of generating and managing a large number of site-unique and strong (i.e. non-guessable) passwords. One way of addressing this prob- lem is through the use of a password generator, i.e. a client-side scheme which generates (and regenerates) site-specific strong passwords on demand, with the minimum of user input. This paper provides a detailed specification and analysis of AutoPass, a password genera- tor scheme previously outlined as part of a general analysis of such schemes. AutoPass has been designed to address issues identified in previously proposed password generators, and incorporates novel tech- niques to address these issues. Unlike almost all previously proposed schemes, AutoPass enables the generation of passwords that meet im- portant real-world requirements, including forced password changes, use of pre-specified passwords, and generation of passwords meeting site-specific requirements. 1 Introduction Despite its widely-discussed shortcomings, text password authentication is widely used to authenticate users to online services. Many attempts have been made to replace simple password authentication, e.g. using biometrics, arXiv:1703.01959v2 [cs.CR] 8 Mar 2017 tokens and multi-factor authentication [4]. However, single-factor password- based authentication remains very widely used.
    [Show full text]
  • Password Security Password Guide for IT Users, Developers, System Administrators, and Senior Management
    Guide Password security Password guide for IT users, developers, system administrators, and senior management. Table of contents Introduction ....................................................................................................... 3 Overall recommendations .................................................................................... 4 Hacker approaches ............................................................................................. 5 Password challenges ........................................................................................... 7 Tip #1 – What is a strong password? .................................................................... 9 Tip #2 – Multifactor authentication ..................................................................... 12 Tip #3 – How to deal with password overload ...................................................... 13 Tip #4 - Awareness and training ......................................................................... 17 Tip #5 - Changing all default passwords .............................................................. 18 Tip #6 - Focus on administrator, service and remote user accounts ........................ 19 Tip #7 – Account lockout and login monitoring ..................................................... 20 Tip #8 – Secure handling of passwords in systems ............................................... 22 Tip #9 - Organizational password policy .............................................................. 24 References......................................................................................................
    [Show full text]