YubiKey Authenticates Microsoft Azure Cloud Platform

YubiKey Authenticates Microsoft Azure Cloud Platform

Yubico has announced the availability of its authentication token YubiKey to increase security for Microsoft Cloud Platform Windows Azure platform applications.

Yubico specializes in providing easy and secure login solutions and the scalable and cost-effective Windows Azure Platform enables customers to build, host and dynamically scale applications and services through the Microsoft data centers around the world.

The collaboration between two companies will increase security in a very cost-effective and flexible manner thanks to the integration between Windows Azure based solutions and the YubiKey two-factor authentication service.

Being able to integrate solutions for two-factor authentication is becoming increasingly more important as customers move their existing assets to the cloud or build new services with a higher demand for security,” said Robert Folkesson, Architect in the Developer and platform group, Microsoft Sweden.

Yubico notes that its project titled ‘YubiKey Azure Authentication’ was recently published on the Microsoft open source community called Codeplex.

This project shows how to integrate YubiKey based authentication in a service running in Windows Azure using the standard ASP.NET membership provider and SQL Azure as the user store back-end.

Yubico’s authentication token YubiKey, according to company’s sources, can significantly simplify the process of logging in with a One-Time Password (OTP) token.

The company claims that its authentication token YubiKey is currently used by more than 10,000 customers all across the world. Its success is also attributed to the rugged, ultra-thin, battery-free, crush safe and waterproof design.

With YubiKey, users don’t have to re-type long pass codes from a display device into the login field of the computer.

One this authentication token is inserted in the USB port of any computer the OTP is generated and automatically entered with a simple touch of a button on the YubiKey. Any type of client software or drivers is not required for this process.

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…