Reverse engineering: Understanding application (Web) complexity

    Part 1: the problem. With UAG, you can provide remote access towards many types of applications:   ·         Web applications: The “client” is in this case a simple browser, and dialog with go through UAG that will act as the reverse proxy. ·         “TCP” applications: the “client” of the application is an executable…

0

Understanding (and extending) UAG Web SSO capabilities

First of all, I would like to thank Matthieu Martineau (matthieu.martineau@piservices.fr) (Gold Partner, MCSE and MCT) with whom I had the opportunity to investigate some of the breaking scenarios I mention at the end of this post In the wide range of services you get when publishing Web application with UAG, we have the ability…

4

Strong authentication using your Brain : IAG and Gridsure.

Gridsure, a UK company, has created a very nice way to provide strong authentication. Strong authentication combines what you know (login, password) and what you have (something physical). In the long list of strong authentication mechanisms we know Smartacards, tokens, and more recently we have seen products capable of using the “mobile phone” as a…

0

GEMALTO (Gemplus / Axalto Merger)

GEMALTO authentication server is called Protiva. It is a global authentication solution which can especially provide OTP (One Time Password) authentication.   The integration is very simple since the protocol used between IAG and Protiva server is Radius, so we just need to change a few things.   Step 1 : In IAG, create a…

0