As everywhere in IT security, it is also important in identity management that a measure is both secure and usable. Users can get creative if something is too time-consuming, annoying or otherwise impractical for them. Is there too many steps to authenticate on the notebook? Then the screen is not locked. Does the screen need […]
Roles of the Nerdhorn
In this example, the nerdhorn is both parent and partner and therefore has other functions, authorizations and tasks to do. As in normal life, digital identities have different roles. Associated with these roles are permissions. Users can have several user roles. A typical concept that implements this is RBAC, Role Based Access Control. Often the […]
Single Sign-On (SSO) for the Nerdhorn
Single Sign-On (SSO) describes the one-time authentication of a user, whereby he or she is authorized to use all associated services without having to authenticate again. SSO is often implemented in companies. If the user changes the device (e.g. from computer to tablet), the authentication is of course no longer necessary. SSO has the advantage […]
Nerdhorn with Password Manager
You don’t have to waste papers to manage your various passwords. In fact, this is counterproductive. It is better to save your passwords in a password manager. Password managers come in both commercial and open source versions. Many password managers also have password generators that help you choose good passwords. This already improves security, but […]
Nerdhorn wants to be secure
A single software or security measure is not enough to ensure security in a network. It requires different layers or pieces of the puzzle that need to interlock. Typical measures are, for example, firewalls and intrusion detection systems. A user account alone is not enough either. A user only has as many authorizations as he […]