Authenticate User

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 66 Experts worldwide ranked by ideXlab platform

Jerry Marceau - One of the best experts on this subject based on the ideXlab platform.

  • one User one password integrating unix accounts and active directory
    SIGUCCS: User Services Conference, 2002
    Co-Authors: David J Blezard, Jerry Marceau
    Abstract:

    The University of New Hampshire has a history of using centralized Unix accounts to Authenticate User access to computers in the public Student Computing Clusters. The advent of Windows 2000 meant that changes would be necessary to support the Active Directory architecture underlying Windows 2000 authentication and authorization. Given limited resources, manually maintaining Active Directory accounts for over 12000 students is an impossibility. A new system was needed to automatically generate an Active Directory account for each and every Unix User and to synchronize password and other account information with as little system administrator intervention as possible. Using a combination of technology from Microsoft and various scripts developed within the UNH Computing and Information Services group, we have created just such a system. For every newly created Unix account, an Active Directory account with an identical User name is generated. Password changes on the Unix systems pass the corresponding password update to the Active Directory domain controllers to assure that the accounts remain synchronized. This system has functioned for a full academic year with only minimal issues. With this infrastructure in place, we hope to be able to leverage it in other fashions.

  • SIGUCCS - One User, one password: integrating unix accounts and active directory
    Proceedings of the 30th annual ACM SIGUCCS conference on User services - SIGUCCS '02, 2002
    Co-Authors: David J Blezard, Jerry Marceau
    Abstract:

    The University of New Hampshire has a history of using centralized Unix accounts to Authenticate User access to computers in the public Student Computing Clusters. The advent of Windows 2000 meant that changes would be necessary to support the Active Directory architecture underlying Windows 2000 authentication and authorization. Given limited resources, manually maintaining Active Directory accounts for over 12000 students is an impossibility. A new system was needed to automatically generate an Active Directory account for each and every Unix User and to synchronize password and other account information with as little system administrator intervention as possible. Using a combination of technology from Microsoft and various scripts developed within the UNH Computing and Information Services group, we have created just such a system. For every newly created Unix account, an Active Directory account with an identical User name is generated. Password changes on the Unix systems pass the corresponding password update to the Active Directory domain controllers to assure that the accounts remain synchronized. This system has functioned for a full academic year with only minimal issues. With this infrastructure in place, we hope to be able to leverage it in other fashions.

David J Blezard - One of the best experts on this subject based on the ideXlab platform.

  • one User one password integrating unix accounts and active directory
    SIGUCCS: User Services Conference, 2002
    Co-Authors: David J Blezard, Jerry Marceau
    Abstract:

    The University of New Hampshire has a history of using centralized Unix accounts to Authenticate User access to computers in the public Student Computing Clusters. The advent of Windows 2000 meant that changes would be necessary to support the Active Directory architecture underlying Windows 2000 authentication and authorization. Given limited resources, manually maintaining Active Directory accounts for over 12000 students is an impossibility. A new system was needed to automatically generate an Active Directory account for each and every Unix User and to synchronize password and other account information with as little system administrator intervention as possible. Using a combination of technology from Microsoft and various scripts developed within the UNH Computing and Information Services group, we have created just such a system. For every newly created Unix account, an Active Directory account with an identical User name is generated. Password changes on the Unix systems pass the corresponding password update to the Active Directory domain controllers to assure that the accounts remain synchronized. This system has functioned for a full academic year with only minimal issues. With this infrastructure in place, we hope to be able to leverage it in other fashions.

  • SIGUCCS - One User, one password: integrating unix accounts and active directory
    Proceedings of the 30th annual ACM SIGUCCS conference on User services - SIGUCCS '02, 2002
    Co-Authors: David J Blezard, Jerry Marceau
    Abstract:

    The University of New Hampshire has a history of using centralized Unix accounts to Authenticate User access to computers in the public Student Computing Clusters. The advent of Windows 2000 meant that changes would be necessary to support the Active Directory architecture underlying Windows 2000 authentication and authorization. Given limited resources, manually maintaining Active Directory accounts for over 12000 students is an impossibility. A new system was needed to automatically generate an Active Directory account for each and every Unix User and to synchronize password and other account information with as little system administrator intervention as possible. Using a combination of technology from Microsoft and various scripts developed within the UNH Computing and Information Services group, we have created just such a system. For every newly created Unix account, an Active Directory account with an identical User name is generated. Password changes on the Unix systems pass the corresponding password update to the Active Directory domain controllers to assure that the accounts remain synchronized. This system has functioned for a full academic year with only minimal issues. With this infrastructure in place, we hope to be able to leverage it in other fashions.

Jian Ren - One of the best experts on this subject based on the ideXlab platform.

  • generalized digital certificate for User authentication and key establishment for secure communications
    IEEE Transactions on Wireless Communications, 2011
    Co-Authors: Lein Harn, Jian Ren
    Abstract:

    Public-key digital certificate has been widely used in public-key infrastructure (PKI) to provide User public key authentication. However, the public-key digital certificate itself cannot be used as a security factor to Authenticate User. In this paper, we propose the concept of generalized digital certificate (GDC) that can be used to provide User authentication and key agreement. A GDC contains User's public information, such as the information of User's digital driver's license, the information of a digital birth certificate, etc., and a digital signature of the public information signed by a trusted certificate authority (CA). However, the GDC does not contain any User's public key. Since the User does not have any private and public key pair, key management in using GDC is much simpler than using public-key digital certificate. The digital signature of the GDC is used as a secret token of each User that will never be revealed to any verifier. Instead, the owner proves to the verifier that he has the knowledge of the signature by responding to the verifier's challenge. Based on this concept, we propose both discrete logarithm (DL)-based and integer factoring (IF)-based protocols that can achieve User authentication and secret key establishment.

Sanraj Rajendra Bandre - One of the best experts on this subject based on the ideXlab platform.

  • Design and implementation of smartphone authentication system based on Color-Code
    2015 International Conference on Pervasive Computing (ICPC), 2015
    Co-Authors: Sanraj Rajendra Bandre
    Abstract:

    Smartphones are used as a communication channel for exchanging User data and coordinating their business work. Users are more concerned about their private data that are stored on their portable devices, but unfortunately these devices are more prone to attacks by malicious Users. The objective of this paper is to provide a new authentication system based on Color-Code such that it will preserve User's privacy and improve smartphone security. Every individual person has his own choice to select different colors. A color sequence can be a variety of unique color combinations and they are easy to remember. A User would specify desired Color-Code sequence as a passkey to Authenticate User on the device. In order to fortify smartphone security from malicious Users, this system uses random colors to increase difficulty of brute force attack. This system is based on multi-phase security schema which Authenticates Users and safeguards their privacy on a smartphone.

Lein Harn - One of the best experts on this subject based on the ideXlab platform.

  • generalized digital certificate for User authentication and key establishment for secure communications
    IEEE Transactions on Wireless Communications, 2011
    Co-Authors: Lein Harn, Jian Ren
    Abstract:

    Public-key digital certificate has been widely used in public-key infrastructure (PKI) to provide User public key authentication. However, the public-key digital certificate itself cannot be used as a security factor to Authenticate User. In this paper, we propose the concept of generalized digital certificate (GDC) that can be used to provide User authentication and key agreement. A GDC contains User's public information, such as the information of User's digital driver's license, the information of a digital birth certificate, etc., and a digital signature of the public information signed by a trusted certificate authority (CA). However, the GDC does not contain any User's public key. Since the User does not have any private and public key pair, key management in using GDC is much simpler than using public-key digital certificate. The digital signature of the GDC is used as a secret token of each User that will never be revealed to any verifier. Instead, the owner proves to the verifier that he has the knowledge of the signature by responding to the verifier's challenge. Based on this concept, we propose both discrete logarithm (DL)-based and integer factoring (IF)-based protocols that can achieve User authentication and secret key establishment.