Authentication

  • Current Version 2.20
  • Size 254K

Description

Brand new and improved <b>ESET Secure Authentication</b> is an easy-to-install and easy to deploy mobile-based two-factor authentication solution <b>for businesses</b>. It uses <b>one-time password (2FA OTP) authentication</b> to secure access to companyâs VPN and a range of supported applications such as <i>Exchange, SharePoint, Dynamics CRM, Custom Apps, and others</i>.

<b>Please note that full functionality requires installation of the server side. For more information and pricing see www.eset.com/business/products/secure-authentication or contact your network administrator.</b>

<b>Whatâs New in ESET Secure Authentication</b>

⢠Improved Installer

⢠Compatibility with Exchange 2013 and Exchange Control Panel

⢠Extended range with secure access to business critical apps (Microsoft SharePoint & Dynamics CRM)

⢠User Interface Refresh

⢠Remote Desktop Web Access Integration

⢠Increased flexibility with Authentication API and SDK

<b>The two-factor, one-time password (2FA OTP) system</b> is a combination of two security factors â <b>âsomething that the user knowsâ</b>, e.g. a password â with <b>âsomething that the user has,â</b> a mobile phone to generate the one-time password for access.

Rely on ESET â a company with over 25 years of experience in enabling businesses and consumers to enjoy safer technology.

Recent changes:

⢠Improved Installer

⢠Compatibility with Exchange 2013 and Exchange Control Panel

⢠Extended range with secure access to business critical apps (Microsoft SharePoint & Dynamics CRM)

⢠User Interface Refresh

⢠Remote Desktop Web Access Integration

⢠Increased flexibility with Authentication API and SDK

Content rating: Everyone

Free

Free WiFi Spot

by Rsp974
  • Current Version 0.9.6.4.1 beta
  • Size 401K

Description

This application is a free wifi manager, it allows you to automatically authenticate on the public Wi-Fi networks (hotspots).

Imagine, you come to work quietly. You plug your phone, and you're connected to the hotspot of your internet service provider without having to enter! And yes, the phone activates the WiFi and identifies itself âº

⥠In addition, it periodically checks the status of the internet connection to the hotspot in order to automatically re-authentication (if necessary).

(Other keywords: ssid, wifi, wi-fi, wifi manager, open wifi, free wifi, wifi login, auto login, auto-login, fon)

Recent changes:

⢠bugs fix & optimizations

/!\ Known issues:

-If bug after update please restart your phone.

-Hidden hotspots are likely to be poorly supported: prefer to use a secure network with a complex password.

Content rating: Everyone

Free

GBAuth

by Global Technology Associates, Inc. / www.gta.com /
  • Current Version 1.0.1
  • Size 27K

Description

GBAuth is an authentication application for GTA Firewalls. This application allows users to easily authenticate an Android device to a GTA Firewall. Enter the name or IP address of the firewall and the user identity and password into the appropriate fields for quick and easy access to your GTA Firewall.

Content rating: Everyone

Free

Garena Authenticator

by Garena Online / www.garena.com /
  • Current Version 1.1.0
  • Size 2M

Description

Garena Authenticator works with 2-step authentication for your Garena Account, providing an additional layer of security when managing account details and playing games.

Garena Authenticator will generate authentication codes directly on your Android Phone without the need for a network connection.

Features include:

- Support for automatic account linking by scanning QR code

- Support for time-based authentication code generation

- Support for multiple accounts linking on the same device

To use your Garena Authenticator, you will need to have 2-step authentication enabled on your Garena Account and then link your Garena Account to your Garena Authenticator.

Recent changes:

Garena Authenticator Version 1.1.0

1. Added support for multiple accounts linking

2. Added account management

3. Enabled copying and pasting of authentication codes

4. Improved user interface

Content rating: Everyone

  • Current Version 3.11
  • Size 2M

Description

Add-On for SMS Backup & Restore - Allows the app to

- Automatically upload to Google Drive.

- Automatically upload to Dropbox.

- Send automated emails after a backup.

This app does not appear in the list of apps in the phone launcher. It is used by the SMS Backup & Restore app and gets opened from the "Backup Settings" screen of that app.

Google Drive:

It may not work with all devices as the Google Play Services may not be available. Please get in touch with me if you get problems.

Dropbox Settings:

This app only has access to its own folder and does not have access to other Dropbox folders.

Check the "Use Browser for Authentication" if you want to use your default/external browser for authentication rather than the built-in functionality.

Email Settings:

All the settings on the screen are dependent on the Mail Service Provider that you use. The details about the service can be found on the providers site. Some of the common ones are linked at the bottom of this section.

Sender Email Address: The email address from which the email should be sent.

Recipient Email Address: The email address of the recipient. If you are sending the email to yourself then this will be the same as the Sender Email Address.

SMTP Server: The HostName/IP Address of the email SMTP server. For example: smtp.gmail.com for Gmail.

Port: The port used by the SMTP server. Normally 25/465/587. For example: 465 for Gmail.

Security: The security used for connecting to the SMTP server. Use SSL/TLS for Gmail.

Require Login: Checked if the SMTP server needs you to authenticate before sending emails. Check this for Gmail.

User Name: The user name required to authenticate with the SMTP server. For Gmail, its your email address.

Password: The password required to authenticate with the SMTP server. For Gmail, its your Gmail password. If you use 2-step authentication in Gmail, you'll need to generate an application specific password.

Subject: The subject for the email.

Body: The message content for the email.

This App needs access to the following:

* Network communication: To connect to Email/Dropbox/Google servers.

* Your accounts: Used for Google Drive account setup.

* View Network Connections: So that the app does not try to upload when there is no network connectivity.

* Test access to Protected Storage: To read the Backup file on the SD card.

Recent changes:

v3.11:

- Fixed a permission denial problem caused by the previous update.

v3.10:

- Simplified Email Settings

- Added support for StartTLS (Hotmail/Outlook.com)

v3.01:

- Added sub-folder support for Google Drive uploads.

v3.00:

- Added auto upload to Google Drive.

- Added Wifi only option for Emails.

Content rating: Everyone

Free

Emue Enterprise Authenticator

by Emue Technologies / www.emue.com /
  • Current Version 1.1.3
  • Size 291K

Description

Available for securing corporate networks and VPNs, the Authenticator is a mobile security token for 2 Factor Authentication (2FA).

The Enterprise Authenticator supports the following functions:

One-time-passcode (OTP)

Mutual Authentication Challenge-Response

Your organisation must use the Emue Authentication Server in order for you to be able to use this application to log in to your corporate network or VPN.

Recent changes:

Optimized for the latest Android operation systems.

Added support for FastPASS automatic login.

Content rating: Everyone

  • Current Version 1.0.8
  • Size 2M

Description

vMEyePro

Video Surveillance in Your Mobile phone

vMEyePro allows Mobile phone users to view and control live video streams from cameras and video encoders.

Features:

Mobile phone for Android compatible.

Unlimited video on cellular and WIFI.

Support MultiChannel video encoder.

Support Remote Playback.

Support device configuration parameters.

Support for IP address and dynamic domain name access(do not contain http://).

Support snapshot management.

Support for authentication.

Support for Pan, Tilt, & Zoom control.

Direct stream connection. without any third party server transfer.

Snapshot capability (while viewing live stream) to save to your local photo gallery.

Support for landscape and portrait mode.

Ability to change framerate and bitrate as desired for internal and remote users.

Demo device detail

address:125.89.62.187

mobile port:9106

user name:admin

password:123456

Contact us

If you are experiencing a problem with either our products or services, then feel free to contact our support team.

The email:support@meyetech.com

The website:www.meyetech.com

vMEye vMEye+ KWeye KWeye+

Recent changes:

Fixed some bugs

Content rating: Everyone

  • Current Version 1.3.21
  • Size 647K

Description

ASSECO Mobile Token is two factor authentication token application.

Recent changes:

Security improvements

Content rating: Everyone

Free

Pass WiFi

  • Current Version 1.0.1
  • Size 116K

Description

å°æ¼æ¯æ¬¡é£ç·WiFiå¾ï¼ç¹å°éåç覽å¨é²è¡èº«åé©è­æå°å­ç©äºåï¼

Pass WiFiæ¯ä¸åãè¬ç¨WiFiç»å¥å·¥å·ãï¼å¯ä»¥ç¨ä¾ä¸éµç¼éHTTP POSTè¨æ¯ï¼éæå¿«éç»å¥WiFiçåè½

<br><br>

ãåªè¦è¨­å®æ­£ç¢ºï¼å¯ä»¥ç¨ä¾å代å¤æ¸WiFiçç»å¥ç¶²é ï¼ä½ä¸¦ä¸ä¿è­é©ç¨æ¼ææWiFié©è­ç³»çµ±ï¼ä½¿ç¨æ¬ç¨å¼éè¦ä¸äºHTMLæPHP/ASP/JSPçåºæ¬è½åï¼æè½å®æ設å®ã

å次使ç¨ï¼è«ä»¥é»è¦éå欲ç»å¥ä¹WiFi身åèªè­ç³»çµ±çç»å¥è¡¨å®ï¼å©ç¨Ctrl+U檢è¦åå§ç¢¼ï¼æ¾å°"form"æ¨ç±¤ï¼å°å¾æ¹action屬æ§çå¼ï¼é£åãå®æ´ç¶²åã輸å¥æ¬App設å®é é¢ç第ä¸åæå­æ¡ç¶ä¸­(exï¼http://www.abc.com/login.php)

åä¾å°ä¸æ¹åé "input"æ¨ç±¤çnameãvalue屬æ§çå¼ï¼åå¥è¼¸å¥å°æ¬Appç設å®é é¢ç¶ä¸­ï¼å¦æ該inputæ¨ç±¤å¾é¢ä¸å«value屬æ§ï¼é£å¾æå¯è½å°±æ¯è¼¸å¥å¸³èãå¯ç¢¼çå°æ¹(è¥type=passwordåçºå¯ç¢¼è¼¸å¥æ¬ä½)ï¼è«èªè¡å°ç»å¥WiFiæéç帳èå¯ç¢¼å¡«å¥æ¬App設å®é é¢çvalueæ¬ä½ç¶ä¸­ï¼å¦å¤éè¦æ³¨æçæ¯ï¼é¨åé©è­ç³»çµ±ç設è¨ï¼æ以å¤æ·éåºæéçå¼æ¯å¦çºç©ºä¾é©è­ä½¿ç¨èæ¯å¦æé²è¡ç»å¥ï¼å æ­¤å»ºè­°å°åé inputæ¨ç±¤(åæ¬æéèé±èæ¬ä½)çå§å®¹é½è¼¸å¥æ¬ç¨å¼ç¶ä¸­

å¦æ使ç¨ä¸çåé¡æå¶ä»æ¹é¢ç建議ï¼æ­¡è¿æä¾çµ¦æååè

Content rating: Everyone

Free

CBA Mobile Token

by HID Global / www.cbagroup.com /
  • Current Version 4.0
  • Size 664K

Description

CBA acknowledges the increase in mobility and demand for banking services anytime, anywhere. With the CBA Mobile Token, there is no need to carry a dedicated device when authenticating to CBA Internet Banking, giving you our customer Time for More.

Content rating: Everyone

Free

Intesa M-Token

by Asseco SEE / www.intesasanpaolobank.ro /
  • Current Version 1.0.0
  • Size 451K

Description

Intesa M-Token is an authentication method for the Internet Banking service called I-B@nk, offered by Intesa Sanpaolo Bank Romania S.A. to his customers. Intesa Sanpaolo Bank Romania is the first bank in Romania to offer this kind of authentication method to his customers as an alternative to the commonly used digipass device. It combines the commodity and familiarity of using your personal I-Phone with the high level of security offered by the digipass authentication.

The Intesa M-Token offers functions such as One Time Password (OTP) for authentication in the I-B@nk and Message Authentication Codes (MAC) for authorizing transactions in maximum security conditions.

The application is available in three languages: English, Italian and Romanian.

Content rating: Everyone

Free

EZMCOMv2 Token

by EZMCOM / www.ezmcom.com /
  • Current Version 4.0
  • Size 598K

Description

The EZMCOM Soft Token allows organizations to provide their users a convenient and secure one-time password authenticator for a broad range of applications that requires strong authentication. The EZMCOM Mobile Soft Token eliminates the need for Android customers to carry a dedicated device when authenticating to online applications and networks. EZMCOM Soft Token application is build with open security standards and supports the OATH (Initiative for Open Authentication) standard for generating one-time passwords. The application provides both event and time based one-time passwords for organizations to choose their strong authentication needs and requirements. It also provides the Challenge Response and Signature OTP as to the OCRA specification from OATH.

The EZMCOM Mobile Soft Token has a simple and secure activation process allowing administrators to quickly deploy Soft Tokens across their organization.

Prerequisites:

EZMCOM Soft Tokens require the purchase of the EzIdentity Authentication platform from EZMCOM. In addition, customers are required to purchase a license pack for Soft Tokens. This Android application (EZMCOM) is provided for installation convenience. Users should contact their IT administrators for further instructions on activation and use.

LANGUAGES:

English

DEVICE REQUIREMENTS:

Android OS 2.3 or later

Links:

EZMCOM Web site

www.ezmcom.com

Content rating: Everyone

Blogs about Authentication

  • (ISC)2 Blog: Authentication, blog.isc2.org Voice of the Information Security Professional A blog posting from Eset outlining some basic tips for reducing the risks associated with social networking/social media/Web 2.0 activities. Posted by Rob Slade on 15 November 2009 at 03:10 AM in Authentication, Confidentiality,

  • Authentication | Plataforma Tecnologia Blog, .br Now both database and token authentication work through HTTP with no extra work and the This allow us to easily require authentication for third party rack application without a

  • Authentication (User) Blog | Symantec Connect Community, About Authentication (User) Blog. User Authentication solutions provide two-factor authentication, public key infrastructure (PKI) services, and risk-based authentication to protect interactions between consumers, business partners, and employees

  • The Received Blog, With Deliverability tools and services from Return Path, more of your email can reach the inbox—which means more responses. Subscribe to the blog feed: Subscribe: Email or RSS. Category Archives: authentication. Page 1 of 2 Prev | Next

  • strong authentication | Blog, Posts with strong authentication on A blog about Identity & Access Management

  • HOW TO:Forms Based Authentication (FBA) on SharePoint 2010, By default, this will use Windows Authentication. Since we haven't setup FBA yet, we need to setup the Web Authentication on Share Point 2010? If you have any information then please send me. My email id is gauravgoyal_5@. blog

  • The Trojan Horse: Sneaking Past Your City Walls, blog.pistolstar.us About the Blog. Blog Authors. Product Messages. The Trojan Horse: Sneaking Past Your City under: Authentication Trends, Data Security, General Information

  • Authentication | MailChimp Email Marketing Blog, Here's the post from the official Gmail Blog. There's another catch — your emails to the recipient have to be authenticated (SPF or DKIM) Word-to-the-wise reports that AOL will begin checking for DKIM Authentication sometime in 2009, as discussed in a recent ESPC call

  • Authentication " Tevora Blog, Two-Factor Authentication Using Your Cell Phone. Friday, 29 October 2010 by Jesse Salmon Use of the cell phone as an authentication method is not only a convenient method of

  • Equifax Blog - Secrets and Authentication, Five to ten years ago, little known facts about our lives were widely used for authentication before we were permitted access to sensitive information. Quite often the question was, "What was your mother's maiden name?" This was a "shared secret

  • Windows Digest authentication, Exploring the intricacies of authentication mechanisms that are available on Windows operating systems - Windows Digest

  • Email Authentication – Are you in the game?, Email Authentication – Are you in the game? by Adam Covati on April Email authentication is an attempt to prove that the person in the from address is who

  • Email Authentication and Authorization | Pinpointe - Business, DKIM is an email authentication' method that organizations and ESPs like Pinpointe use to verify to the recipient that the email is coming from a valid email server, and We cover an explanation of DKIM Email Authentication in our blog entry DKIM Email Authentication

  • IT Security " Authentication, Blog. Category. Authentication. Archive for the 'Authentication' Since users might not understand the finer details of authentication, encryption, and web app exploits, it's good to see a news

  • Authentication | LuxSci FYI, Home " FYI Blog. Posts Tagged authentication' LuxSci Outbound Email: 5 Sending Options Compared! Published: Friday, May 22nd, 2009. It used to be that to send an email, you had very few choices and even less control over what happened once the

  • AuthenticationWorld Blog, However, before we leap to discussing stronger forms of authentication, perform an enterprise risk ***ysis for all physical and logical assets. That's what this blog is going to discuss. I am going to use an old ***ogy of putting the cart before the horse and not getting anywhere until the

  • The Real Blogger Status: Blogger Provides Blog Access Using, Blogger Provides Blog Access Using Two Factor Authentication. Many bloggers are confused about how to protect their blogs, both from unauthorised administrative access, and unauthorised Blogger uses two factor authentication, to protect your blog

Forums about Authentication

  • Weblogs Forum - HTTP Authentication Woes, It is not as easy to make that path obvious when using the client's HTTP authentication dialog. With HTTP authentication, I can force the user to sign in before doing things that require being signed in, like posting to a forum or administration

  • Building a Forum with Dreamweaver – Part 2: Setting Up User, Setting Up User Authentication In the following sections of this tutorial, you will use ImpAKT to build a user authentication system for your forum. You need

  • About the Product Authentication + Security Summit (PASS), product- The Poduct Authentication and Security Summit aims to help devise security programs to help secure the supply chain. 3rd Tax Stamp Forum. About the Product Authentication + Security Summit (PASS) PASS is about developing a corporate culture which integrates product security and supply chain security

  • WW2 uniform, awards, armor, weapons history. War relics forum, WW2 military historians and collectors forum. History: 3 Reich and Soviet Red army uniforms, awards, weapons, armor and helmets. Battlefield archeology and historical recovery. World war pictures

  • Integrated Authentication Bug? - AspNetForum - forum, Integrated Authentication Bug? - AspNetForum - forum software Hi I've just download the free trial to evaluate the forum and noticed the same error - if you use the integrated authentication, when you log out of the host website you stay logged in the forum

  • Infrae: Silva Forum Released, with OpenID Authentication, Infrae is pleased to announce the first public release of Silva Forum, an extension for Silva 2.x that provides a classic discussion forum environment. It can be integrated with OpenID authentication and a CAPTCHA to prevent 'spambots' from

  • Rails on Edge: Rails Forum - Restful Authentication(Part 3 of 3), Rails Forum - Restful Authentication(Part 3 of 3) So here is part 3 Today we are going to put authentication on top of our application, using the

  • NetSarang - Kerberos authentication, netsarang.com Home > Support > Xmanager Forum. Xmanager Forum. Kerberos authentication. Last post: Wednesday, January 23, 2008 12:00 PM by Support, Kerberos authentication will be needed to gain a token for access to the OpenAFS file system. As the home directory for each account will be on the AFS file system,

  • User authentication, This forum is for discussing how to use Moodle with various types of authentication and You're welcome to browse and/or contribute to the Authentication documentation and

  • Category:Authentication - Forum Nokia Wiki, Category:Authentication. From Forum Nokia Wiki. Pages in category " Retrieved from "http:///index.php/Category:Authentication"

  • Open Key vs. Shared Key - Wireless Networking | DSLReports Forums, Open Key vs. Shared Key - Wireless Networking | DSLReports Forums, broadband news, information and community Bottom line: Shared Authentication does not add any security, and may weaken your security. Don't bother with it. to forum · 2003-11-30 14:00:18

  • proxy authentication does not work - CSI - Forum - Community, Forum Thread: proxy authentication does not work. You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it. This thread was submitted in the following forum: CSI

  • MAC Authentication - Wireless-General-Discussions - Wireless, tomshardware.com Archived from groups: alt.internet.wireless (More info?) Why, do you suppose, have they not implemented MAC authentification as the "Passkey" to enter private networks. Seems to me that Tom's Hardware > Forum > Wireless Networking > General Discussion > MAC Authentication

  • Tagged with authentication - Forum, Please read the following post before posting : http:///forum/discussion/240/before-posting-bugs-stff-svn Plugin for remote authentication over HTTP available. 3 comments Most recent by emaijala November 2010Contributed Plugins. Happy with the support?By donating, even a small

  • Nemesis: Preventing Web Authentication and Authorization, forum.stanford.edu Forum. Why is this broken? Every web app rolls own authentication, session mgmt. system Forum. Nemesis: Stopping Auth Attacks. Must infer when a user is authenticated safely

  • Custom Forms Authentication cookie for Single Sign On, If you are trying to integrate the software into your own site, and are in the following situation: You are already using a Forms Authentication Cookie (Cookie A) for authentication (login) for your site (whether or not you have your own

Twitter about Authentication

  • FabioAmbiente: Mapping security services to authentication levels: Com este relatório, publicado pela ENISA, a organização resp... http://bit.ly/iwwFqW

  • perloop: #perl LWP proxy user authentication http://goo.gl/7B3zm

  • bryanbolling: RT @PhilTranfa: Claims Tips 4: Learning About Claims-Based Authentication in SharePoint 2010 http://bit.ly/jYQuoe

  • G_Ant: Just published: "A Taxonomy of #Authentication Methods, Update" http://www.gartner.com/resId=1698822 #Gartner

  • orestisf: Lithuania Goes Live in Pilot 1 "Cross-Border Authentication Platform for Electronic Services" http://ow.ly/53pSi #eid #stork #gov20

  • MakePaymentsPay: Qn for PhilC: do we have authentication services fit for purpose of electronic payments. PhilC answer: banks must invest #paymentscouncil

  • jmlw1: Qn for PhilC: do we have authentication services fit for purpose of electronic payments. PhilC answer: banks must invest #paymentscouncil

  • ivardi: What's with Huffington Post denying access without authentication?

  • LouiseRobertson: LiveEnsure protecting Mobile transactions http://lnkd.in/BqfYbM

  • xmobile_phones: Google Fixing Its Android Authentication Token Flaw To Plug User Login Credentials Leak http://t.co/RpaO5zm via @techdingdotcom #85

  • delortae: Authentication Question? #DelortaeAgency Our Page - HASHTAG.net http://tiny.cc/d91k6 via HASHTAG_NET

  • murdead: Adsl link down, authentication error, connected. Adsl link down, authentication error, connected. :s

  • domster: User authentication working. Woot. Onwards! #ror

  • RonsardFerguson: http://tumblr.com/xy82oy5qfw promise rings #concorde plus size clothes love #bp streaming music plastic surgery authentication #leverage

  • TuongBusarow092: http://tumblr.com/xcy2oy2y2o learn english #bookkeeper bracelets cataracs jewerly authentication hair brush human behavior niv bible

  • gadget_hotspot: Google Fixing Its Android Authentication Token Flaw To Plug User Login Credentials Leak http://t.co/RpaO5zm via #46

  • ActivIdentityEU: New laws on data breaches come into force today http://bit.ly/kmqbbl <- don't wait 'til it's too late to implement strong authentication

  • bnravitej: @pramd7 @srikanth_p :). NAL is a secure military organisation. It requires authentication from the department on a few documents.

  • Channelnews: Industry Views; CRYPTOCard's Neil Hollister looks at the prospects for remote authentication technology in the cloud: http://bit.ly/jR8G66

  • madduri: RT @camelialand: OSDD doing grid authentication and meta scheduling for Galaxy jobs #usegalaxy. Really interesting.