YubiKey Authenticates Microsoft Azure Cloud Platform

YubiKey Authenticates Microsoft Azure Cloud Platform

Yubico has announced the availability of its authentication token YubiKey to increase security for Microsoft Cloud Platform Windows Azure platform applications.

Yubico specializes in providing easy and secure login solutions and the scalable and cost-effective Windows Azure Platform enables customers to build, host and dynamically scale applications and services through the Microsoft data centers around the world.

The collaboration between two companies will increase security in a very cost-effective and flexible manner thanks to the integration between Windows Azure based solutions and the YubiKey two-factor authentication service.

Being able to integrate solutions for two-factor authentication is becoming increasingly more important as customers move their existing assets to the cloud or build new services with a higher demand for security,” said Robert Folkesson, Architect in the Developer and platform group, Microsoft Sweden.

Yubico notes that its project titled ‘YubiKey Azure Authentication’ was recently published on the Microsoft open source community called Codeplex.

This project shows how to integrate YubiKey based authentication in a service running in Windows Azure using the standard ASP.NET membership provider and SQL Azure as the user store back-end.

Yubico’s authentication token YubiKey, according to company’s sources, can significantly simplify the process of logging in with a One-Time Password (OTP) token.

The company claims that its authentication token YubiKey is currently used by more than 10,000 customers all across the world. Its success is also attributed to the rugged, ultra-thin, battery-free, crush safe and waterproof design.

With YubiKey, users don’t have to re-type long pass codes from a display device into the login field of the computer.

One this authentication token is inserted in the USB port of any computer the OTP is generated and automatically entered with a simple touch of a button on the YubiKey. Any type of client software or drivers is not required for this process.

By Anuradha Shukla

About CloudBuzz

Discover some of the top aggregated and curated technology news stories from around the world under the CloudBuzz authorship.

Catchup on trending stories related to Big Data, Cloud Computing, Wearable Technology, Internet of Things, Virtual Reality, Mobile Technologies and much more from some of the top information sources.

Find out more
View All Articles

Sorry, comments are closed for this post.

Hoarders And Data Collectors:  On The Brink Of Unmanageability

Hoarders And Data Collectors: On The Brink Of Unmanageability

Hoarders and Data Collectors In our physical world, hoarders are deemed “out of control” when they collect too much.  Surely the same analogy applies in our online world.  When providers collect realms of data from us, it seems they lose control of that too?  In the last months it’s not just the frequency of data…

Newton’s First Law and Cloud

Newton’s First Law and Cloud

Scaling the Mountain “You’re kidding me, the server went down? What are we supposed to do about launching the new website? We promised our partners that we would go live this weekend. I’ll admit its forty new pages but it’s just a website. How long before it all gets fixed?” I’ll bet you have been to this…

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many agencies have made strides toward hardening their cyber security, outdated IT infrastructure and architecture is…

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

IRM Cloud-Based File Collaboration  Data breaches and data loss due to insider threats, including malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks that keep managers up at night, according to new research by Ernst & Young. How can we ensure that the right people in an organization have the right access to…

Eventually Everything Will Wind Up In The Public Cloud

Eventually Everything Will Wind Up In The Public Cloud

The Public Cloud “Eventually everything will wind up in the public cloud.” Diane Greene, Google’s New Cloud Chief, May 6, 2016 “Private cloud is what most companies are adopting.” “No, public cloud is better and will dominate in the end.” “Nonsense, hybrid cloud is the way to go.” Need an answer? It’s in Manitoba! CIOs…

How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles
Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing In The Cloud Marketers are constantly looking for better ways to tantalize and engage customers, and there’s no space more competitive than the digital universe. Deliberating over pleasing layouts, effective calls to action, site responsiveness, and much more, digital marketers have more than enough to keep themselves busy without understanding the intricacies…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor