Touch ID and Beyond: Duo’s Plans for WebAuthn
At RSA Conference, we'll announce the general availability of Touch ID as a WebAuthn MFA method in Google Chrome.
At RSA Conference, we'll announce the general availability of Touch ID as a WebAuthn MFA method in Google Chrome.
It would be pretty cool if we had a framework available to us that validated a user’s identity, validated the machine they were using, and applied some policy and context for everything they tried to access. A model that would move the perimeter to anywhere an access decision is made. Oh, wait, we do. It’s often referred to as zero trust.
Two-factor authentication (2FA) is one of the most important authentication tools. Learn what it is, why it's essential, how it works, and how to get started.
For federal agencies, compliance laws, policies and standards are often so confusing that they use specialized consultants to determine whether a desired IT initiative will result in compliance issues. Here, we’ll help you cut through the confusion and outline some of the key compliance regulations federal agencies must follow.
Here we dive in to the basics of secure single sign-on (SSO): how it works, the benefits of using it, and how you can begin the process of deploying SSO.