From the course: Authentication Systems for Identity and Access Managers (IAM): From Multi-Factor Methods to Federation Services
Learning objectives
From the course: Authentication Systems for Identity and Access Managers (IAM): From Multi-Factor Methods to Federation Services
Learning objectives
Hello, I'm Amir Lakhani. Today, we're going to be talking about authentication systems specifically for IAM or Identity and Access Management. We're going to be talking about different authentication methods, including implementing passwords, multi-factor authentications, biometrics, and something that's new and cutting edge, passwordless solutions. We'll talk about common multi-factor authentication security attacks and really how you can guard against those attacks. We'll talk about something that's extremely popular, especially with large enterprise organizations, SSO, or single sign-on. We'll talk about how to implement single sign-on, as well as some of the attacks and weaknesses against single sign-on. Lastly, we'll talk about authentication policies and some alternatives to authentication policies as well. Obviously, we want to wrap up knowing exactly where our violations can come from, what our logs are saying. So we'll talk about validating and auditing our authentication systems. All right. Thank you.