YubiKey Authenticates Microsoft Azure Cloud Platform

YubiKey Authenticates Microsoft Azure Cloud Platform

Yubico has announced the availability of its authentication token YubiKey to increase security for Microsoft Cloud Platform Windows Azure platform applications.

Yubico specializes in providing easy and secure login solutions and the scalable and cost-effective Windows Azure Platform enables customers to build, host and dynamically scale applications and services through the Microsoft data centers around the world.

The collaboration between two companies will increase security in a very cost-effective and flexible manner thanks to the integration between Windows Azure based solutions and the YubiKey two-factor authentication service.

Being able to integrate solutions for two-factor authentication is becoming increasingly more important as customers move their existing assets to the cloud or build new services with a higher demand for security,” said Robert Folkesson, Architect in the Developer and platform group, Microsoft Sweden.

Yubico notes that its project titled ‘YubiKey Azure Authentication’ was recently published on the Microsoft open source community called Codeplex.

This project shows how to integrate YubiKey based authentication in a service running in Windows Azure using the standard ASP.NET membership provider and SQL Azure as the user store back-end.

Yubico’s authentication token YubiKey, according to company’s sources, can significantly simplify the process of logging in with a One-Time Password (OTP) token.

The company claims that its authentication token YubiKey is currently used by more than 10,000 customers all across the world. Its success is also attributed to the rugged, ultra-thin, battery-free, crush safe and waterproof design.

With YubiKey, users don’t have to re-type long pass codes from a display device into the login field of the computer.

One this authentication token is inserted in the USB port of any computer the OTP is generated and automatically entered with a simple touch of a button on the YubiKey. Any type of client software or drivers is not required for this process.

By Anuradha Shukla

Sorry, comments are closed for this post.

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…