[Articles] How efficient operation and maintenance through two-factor authentication to ensure secure access to IT resources fortress machine

In everyday use IT bastion machine operation and maintenance, user account password after you log fort machine, you can perform operations with IT resources or access to their rights. And the user's machine account password once the bastion is compromised, meaning that unauthorized persons can easily access with permission IT resources, enterprise data security can not be guaranteed, the consequences would be disastrous.

So, how do we even leaked password can ensure data security? Two-factor authentication is clearly an effective means. Dual-factor authentication is a security authentication procedure, is used to control access to sensitive system and data. In this verification process, the need to provide users with two different authentication factors to prove their identity, and thus play better protect corporate data security.

[Articles] How efficient operation and maintenance through two-factor authentication to ensure secure access to IT resources fortress machine

Process small series, in use, operation and maintenance clouds Butler found Cloud steward comprising two-factor authentication function, its user login behavior, operation and maintenance of key equipment (such as: registration application, perform sensitive instructions, etc.) double factor certification, confirming the identity of the current operation and maintenance personnel to achieve safe operation and maintenance needs.

Clouds housekeeper supports a variety of authentication methods available to users according to their actual freedom of choice. include:

1, micro-channel authentication: binding micro-channel codes to obtain two-factor authentication;

2, SMS authentication: Users are bound phone number to get a code to carry out two-factor authentication;

3, the dynamic token: OTP phone supports dynamic binding to two-factor authentication tokens.

In the face of this secondary authentication bastion machines barrier, even if others appear hacking, user password leaks and other major security incidents, illegal visitors still "do anything", so you can avoid unnecessary losses caused to the company, to ensure enterprise data security.
Baidu search for "Clouds housekeeper."

Guess you like

Origin blog.51cto.com/13728988/2430520