Securing HPC using Federated Authentication

08/20/2019
by   Andrew Prout, et al.
0

Federated authentication can drastically reduce the overhead of basic account maintenance while simultaneously improving overall system security. Integrating with the user's more frequently used account at their primary organization both provides a better experience to the end user and makes account compromise or changes in affiliation more likely to be noticed and acted upon. Additionally, with many organizations transitioning to multi-factor authentication for all account access, the ability to leverage external federated identity management systems provides the benefit of their efforts without the additional overhead of separately implementing a distinct multi-factor authentication process. This paper describes our experiences and the lessons we learned by enabling federated authentication with the U.S. Government PKI and InCommon Federation, scaling it up to the user base of a production HPC system, and the motivations behind those choices. We have received only positive feedback from our users.

READ FULL TEXT
research
06/26/2019

Smart Contract Federated Identity Management without Third Party Authentication Services

Federated identity management enables users to access multiple systems u...
research
07/12/2019

A Federated Lightweight Authentication Protocol for the Internet of Things

Considering the world's IoT development and market, it is necessary to g...
research
11/10/2022

Warmup and Transfer Knowledge-Based Federated Learning Approach for IoT Continuous Authentication

Continuous behavioural authentication methods add a unique layer of secu...
research
08/16/2023

Challenges with Passwordless FIDO2 in an Enterprise Setting: A Usability Study

Fast Identity Online 2 (FIDO2), a modern authentication protocol, is gai...
research
08/10/2022

Multi-Factor Key Derivation Function (MFKDF)

We present the first general construction of a Multi-Factor Key Derivati...
research
10/15/2018

Review of Barriers for Federated Identity Adoption for Users and Organizations

A look at Identity as a Service (IDaaS) and Federated Identity Managemen...
research
10/17/2022

A Systematic Study of the Consistency of Two-Factor Authentication User Journeys on Top-Ranked Websites (Extended Version)

Heuristics for user experience state that users will transfer their expe...

Please sign up or login with your details

Forgot password? Click here to reset