![]() ![]() Password reuse often leads to a single password attack or compromise that can lead to other breaches in different places. Often, end-user security controls are the weakest, and people most often use their mobile devices to connect to SaaS applications like Office 365, Box and others.īy potentially removing passwords from the security equation, Microsoft is enabling a much more secure method to connect users via multifactor authentication, while at the same time reducing the perennial issue of password reuse across numerous sites and services. There are many implications of Microsoft's announcement in the cloud security world. In these cases, Authenticator can be configured with a two-step verification method, where an additional entry from the app is needed once a username and password are provided to the SaaS or Microsoft service. Passwords are still supported if users want them or if an application requires them in some circumstances. In essence, this shifts user authentication away from passwords to a multifactor model that employs a mobile device plus biometrics - facial recognition or fingerprints - or a PIN. In 2017, Microsoft announced biometric support for Microsoft accounts, which could eliminate password-based logins, and the recent Ignite announcement extended this capability to Azure AD-enabled cloud applications, too. The Microsoft Authenticator app is a tool that was released several years ago that unified both on-premises and Azure Active Directory ( AD) logins for users to access cloud apps connected to Azure AD and Microsoft accounts. At its Ignite 2018 conference, Microsoft made a bold claim that the end of the password is upon us, and that it is in large part because the company is expanding the Microsoft Authenticator app to work with tens of thousands of Azure AD-connected cloud apps. As a result, a hacker shut the console down completely.įast forward to the present and things may finally be shifting in a better direction. That exact scenario happened in 2014 with vendor Code Spaces, which failed to protect its cloud administration console with more than a password. Now, imagine if those accounts were only protected by passwords. Of the accounts, 11% were zombies that had never been used, and 80% of companies evaluated had at least one cloud account that had not been disabled after an employee left the organization. In 2014, cloud access security broker (CASB) vendor Adallom - which has since been acquired by Microsoft - released some startling statistics about account security within SaaS applications. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |