Configuration and Metadata Certificate Changes

English on August 7th, 2016 No Comments

Applies to the Public IDP. Not to our IDPee offerings. Update: Public IDP Metadata will be replaced during a maintenance window at the weekend of 13/14th August 2016. We do not expect downtime but there may be some changes needed at your service provider. SSOCircle Root CA certificate used for client certificate authentication will also […]

Tags: , , , ,

Enable Key Generation in Chrome

English on June 6th, 2016 No Comments

The following article refers to the process of generating client certificates at the SSOCircle Public IDP. In the PKI functionality of SSOCircle IDP we allow the automatic generation of keys and the enrollment of X.509 certificates. Client certificates are used for strong authentication. These certificates are not related to the certificates used with SAML single […]

Tags: , , , ,

Service Provider controlled Security Levels

English on June 8th, 2008 No Comments

SSOCircle and IDPee now support different SAML2 authentication contexts. The SP is now able to require that a user is authenticated at the specified security strength. SSOCircle will determine the current authentication level and if necessary, asking the user to reauthenticate to the stronger security level. Think of three different types of use cases. For […]

Tags: , , , , , ,

Strong Two Factor Authentication with USB Hardware Smart Card Tokens

English on November 10th, 2007 No Comments

Continuing the road to secure strong authentication SSOCircle now supports USB hardware smart card tokens. These tokens are a combined smart card and smart card reader with a USB interface. Because of their small size, they can be easily attached to a key ring. Have you ever been worried using a public internet terminal ? […]

Tags: , , , , , , ,

Strong Authentication and Public Key Infrastructure

English on August 18th, 2007 No Comments

As one of our main goals has always been the improvement of authentication security, SSOCircle is now offering Strong Authentication with X.509 Certificates and a PKI supporting automatic enrollment of Certificates. Using Certificate based authentication reduces the threat of Phishing ( a malicious site that pretends to be the login mask of someother and reads […]

Tags: , , , ,