See: reconfirm
Mentioned in ?
References in periodicals archive ?
IPSec disconnects the tunnel and requires users to reauthenticate when they encounter a coverage gap, move from one network to another, or suspend/resume their laptops.
This can range from asking users to reauthenticate themselves -- often using another factor, such as a cell phone, or as is more commonly done, by answering one or more private questions that only the legitimate user can presumably answer correctly.
Johnson's memo, which includes a security checklist created by the National Institute for Standards and Technology, recommended four actions: use encryption when carrying agency data; use two-factor authentication provided by a device that is separate from the computer (such as a USB token); ensure that users reauthenticate after 30 minutes of inactivity; and verify that all sensitive data is purged within 90 days if no longer required.
As voice clients roamed, they had to reauthenticate with the access points, which would drop the call.
Other capabilities include: enterprise SSO functionality, which grants access to any number of Microsoft Windows client/ server, Web or mainframe applications without the user having to reauthenticate to each new application; multiple authentication methods such as a password, digital certificate, smart card or fingerprint-based biometric; and automated password change so application passwords can be strengthened without impacting user productivity.
The attempt to reauthenticate photographic experience is being played out not only along the axis of personal experience but also across history.
In addition, because mobile devices on a Meru WLAN do not need to continuously scan for "better" networks or reauthenticate while roaming, their battery life is extended significantly.
For those providers aggregating services from their partners, the RSA(R) Federated Identity Manager allows organizations to easily pass a user's identity from one partner to the other, without requiring the user to reauthenticate, creating a seamless consumer experience.
One speaker showed how he could walk into a Starbucks, force users to disconnect from the access point (AP), and capture the usernames and passwords of unsuspecting patrons when their computers (automatically) tried to reauthenticate with the AP.
The TF2000 also identifies when the user returns and sends a key sequence to ready the system for reauthentication, minimizing the time it takes to reauthenticate.