Authentication Token Cybersecurity
This video highlights five authentication token cybersecurity attacks that can be used to expose secure resources and pose a risk to any infrastructure. These attacks are not specific to any one technology but rather take advantage of authentication token cybersecurity issues with SAML, OAuth, Kerberos, etc.
The five authentication token cybersecurity attacks that are highlighted in this video include:
- Man in the Middle
- Compromised Tokens
- Denial of Service
- Assertion Repudiation
- User Re-authentication
The video concludes with the introduction of NIST 800-63-3 Digital Identity Guidelines which require Holder of Key to prevent authentication token cybersecurity attacks on secure resources.
For more information download TELEGRID’s whitepaper Authentication Token Cybersecurity and NIST 800-63-3