Are we heading for Identity Management Federation (Part 2)

by Ricky Magalhaes
Sept. 1, 2017 0 comments TechGenix Encryption & Authentication access control

In the previous article we covered familiar authentication methods and what constitutes two and multifactor authentication. We also covered the different token types. With more authentication methods than ever before, previously we noted that hardware has progressed to a point that can facilitate complex authentication processes.