Nerdhorn: Security vs Usability

Einhorn09

As everywhere in IT security, it is also important in identity management that a measure is both secure and usable. Users can get creative if something is too time-consuming, annoying or otherwise impractical for them. Is there too many steps to authenticate on the notebook? Then the screen is not locked. Does the screen need […]

Roles of the Nerdhorn

Einhorn11

In this example, the nerdhorn is both parent and partner and therefore has other functions, authorizations and tasks to do. As in normal life, digital identities have different roles. Associated with these roles are permissions. Users can have several user roles. A typical concept that implements this is RBAC, Role Based Access Control. Often the […]

Single Sign-On (SSO) for the Nerdhorn

Einhorn10

Single Sign-On (SSO) describes the one-time authentication of a user, whereby he or she is authorized to use all associated services without having to authenticate again. SSO is often implemented in companies. If the user changes the device (e.g. from computer to tablet), the authentication is of course no longer necessary. SSO has the advantage […]

Nerdhorn with Password Manager

Einhorn08

You don’t have to waste papers to manage your various passwords. In fact, this is counterproductive. It is better to save your passwords in a password manager. Password managers come in both commercial and open source versions. Many password managers also have password generators that help you choose good passwords. This already improves security, but […]

Nerdhorn wants to be secure

Einhorn07

A single software or security measure is not enough to ensure security in a network. It requires different layers or pieces of the puzzle that need to interlock. Typical measures are, for example, firewalls and intrusion detection systems. A user account alone is not enough either. A user only has as many authorizations as he […]