Web Authentication and Access Control

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • risk-based authentication (RBA)

    Risk-based authentication (RBA) is a method of applying varying levels of stringency to authentication processes based on the likelihood that access to a given system could result in its being compromised. As the level of risk increases, the authenti... 

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security system in which more than one form of authentication is implemented to verify the legitimacy of a transaction... (Continued) 

  • authentication, authorization, and accounting (AAA)

    Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. 

  • user account provisioning

    User account provisioning is a business process for creating and managing access to resources in an information technology (IT) system. To be effective, an account provisioning process should ensure that the creation of accounts and provisioning of ... 

  • knowledge-based authentication (KBA)

    Knowledge-based authentication (KBA) is an authentication scheme where the user is asked to answer at least one "secret" question during an online registration process. 

  • identity chaos (password chaos)

    Identity chaos (sometimes called password chaos) is a situation in which users have multiple identities and passwords across a variety of networks, applications, computers and/or computing devices. 

  • anonymous Web surfing (Web anonymizer, SafeWeb)

    Anonymous Web surfing allows a user to visit Web sites without allowing anyone to gather information about which sites the user visited. 

  • walled garden

    On the Internet, a walled garden is an environment that controls the user's access to Web content and services. 

  • access log

    An access log is a list of all the requests for individual files that people have requested from a Web site. 

  • Best practices: Identity management - Part 2

    Do you know how to optimize your identity management? Learn how In part 2 of Best practices: Identity management where experts Kelly Manthey and Peter Gyurko discuss how using case studies involving a Fortune 500 bank. 

  • What is identity management?

    Do you know what identity management is and how to properly manage it? This expert video featuring Kelly Manthey and Peter Gyurko explores the role of identity mangement and how it can benefit your enterprise. 

  • Countdown - Top 5 Technologies on the Leading Edge of Authentication

    Authentication technologies have made great strides as of late, and the timing couldn't be better: privilege creep, insider abuse and numerous other issues are causing enterprises to turn to innovative techniques to solve emerging problems. In this p... 

About Web Authentication and Access Control

Get tips and tricks on Web access authentication and control. Learn when restricting Web access is necessary and how Web application IAM techniques like single sign-on can thwart hacker attacks and threats.