<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Authentication Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/authentication/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/authentication/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Fri, 24 Apr 2020 12:10:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Use tokens for microservices authentication and authorization</title>
		<link>https://www.aiuniverse.xyz/use-tokens-for-microservices-authentication-and-authorization-2/</link>
					<comments>https://www.aiuniverse.xyz/use-tokens-for-microservices-authentication-and-authorization-2/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Fri, 24 Apr 2020 12:09:57 +0000</pubDate>
				<category><![CDATA[Microservices]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Development]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=8349</guid>

					<description><![CDATA[<p>Source: searchapparchitecture.techtarget.com When assembled correctly, a microservice architecture gives applications interoperation between various services, possibly hosted across different platforms. For microservices, security must be top of mind, <a class="read-more-link" href="https://www.aiuniverse.xyz/use-tokens-for-microservices-authentication-and-authorization-2/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/use-tokens-for-microservices-authentication-and-authorization-2/">Use tokens for microservices authentication and authorization</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: searchapparchitecture.techtarget.com</p>



<p>When assembled correctly, a microservice architecture gives applications interoperation between various services, possibly hosted across different platforms. For microservices, security must be top of mind, since there&#8217;s no way to contain users as in a monolithic application.</p>



<p>Instead of simply allowing upfront access to a microservices-based application, development teams need to also secure and manage access for each user-facing service. However, users do not want to be challenged every time they move from one service to another. New security approaches maximize protection in a distributed architecture without inhibiting user experience.</p>



<p>In this tip, we review the basics of how to manage access in a distributed architecture and examine the role that token-based security plays in microservices authentication and authorization.</p>



<h3 class="wp-block-heading">Authentication and authorization in microservices</h3>



<p>The first key to unlock microservices security is authentication and authorization:</p>



<ul class="wp-block-list"><li><strong>Authentication</strong> determines who you are by validating that a particular entity is actually what it claims to be.</li><li><strong>Authorization</strong> regulates what you are allowed to do through assigned roles and classes that define the various permissions a user has.</li></ul>



<p>With the right tools in place, an application can perform authentication once per session, while still allowing authorization to occur multiple times as a call moves from one microservice to another.</p>



<p>For microservices authentication, go beyond the basic <em>challenge-and-response</em> system, based on usernames and passwords alone. Instead, the user-facing microservice should perform multi-factor authentication (MFA), relying on a separate authentication app on a user&#8217;s device or perhaps a physical token like an RSA SecurID tag. This microservice authentication approach will also require a security token service (STS).</p>



<h3 class="wp-block-heading">The history of microservices token authentication</h3>



<p>The concept of the STS stems from service-oriented architecture, when WS-Trust became a standardized security protocol for token management. WS-Trust was originally modeled around SOAP and used languages like SAML to distribute tokens in the form of XML documents, also known as SAML Assertions.</p>



<p>The movement toward distributed web-app development caused software teams to look for security tokens that worked with RESTful and JSON formats. Some of the token technology that arose from this need include JSON web token and OAuth 2.0.</p>



<h3 class="wp-block-heading">Security token service</h3>



<p>STS enables clients to obtain the credentials they need to access multiple services that live across distributed environments. It issues digital security tokens that stay with users from the beginning of their session and continuously validate their permission for each service they call. An STS can also reissue, exchange and cancel security tokens as needed.</p>



<p>The STS must connect with an enterprise user directory that contains all the details about user roles and responsibilities. This directory, and any connection made to it, should be properly secured as well, otherwise users could elevate their permissions just by editing policies on their own. Consider segmenting user access policies based on roles and activities. For instance, identify the individuals who have administrative capabilities. Or, you might limit a developer&#8217;s access permissions to only include the services they are supposed to work on.</p>



<p>A basic outline of how such a system works is shown in Figure 2.</p>



<p>First, a user logs into an application and provides authentication details through a challenge-and-response system that is supported by MFA. Then, the STS uses information derived from the MFA to determine which token to provide the user at the start of the session. This token remains with the user throughout the session, still managed by the STS, and each service the user tries to access checks the token to allow or deny access.</p>



<h3 class="wp-block-heading">Securing automated access</h3>



<p>Not all microservices permission and security checks are based around a human user. Automated components also generate microservices access requests. Consider the rise of the internet of things, which has led to a massive growth in the use of automated devices. These devices transmit their own data across networks and access any number of services, either for data analysis or to trigger certain functions. Since many of these activities are event-driven, they have almost zero dependency on human intervention.</p>



<p>The above microservices authentication and authorization approaches are still valid in these scenarios, except that MFA doesn&#8217;t work for non-human components that can&#8217;t interact with end-user devices or physical tokens. In these cases, it&#8217;s best to embed any automated component that accesses your services with a unique identifier, such as an embedded serial number, that the STS can use to verify what tokens it should issue. Technologies like OAuth and OpenToken provide ways to embed these devices with unique identifiers.</p>
<p>The post <a href="https://www.aiuniverse.xyz/use-tokens-for-microservices-authentication-and-authorization-2/">Use tokens for microservices authentication and authorization</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/use-tokens-for-microservices-authentication-and-authorization-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>KPMG: How AI Defense Can Counter Faster Payments Fraud</title>
		<link>https://www.aiuniverse.xyz/kpmg-how-ai-defense-can-counter-faster-payments-fraud/</link>
					<comments>https://www.aiuniverse.xyz/kpmg-how-ai-defense-can-counter-faster-payments-fraud/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Fri, 07 Dec 2018 05:40:14 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Financial Crime]]></category>
		<category><![CDATA[Fraud Prevention]]></category>
		<category><![CDATA[Payments Fraud]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=3190</guid>

					<description><![CDATA[<p>Source- pymnts.com Everything can seem right. But that’s only because the criminals are good. A person calls to inform a consumer that his or her account had been <a class="read-more-link" href="https://www.aiuniverse.xyz/kpmg-how-ai-defense-can-counter-faster-payments-fraud/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/kpmg-how-ai-defense-can-counter-faster-payments-fraud/">KPMG: How AI Defense Can Counter Faster Payments Fraud</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source- <a href="https://www.pymnts.com/news/security-and-risk/2018/ai-real-time-payments-fraud-prevention/" target="_blank" rel="noopener">pymnts.com</a></p>
<p>Everything can seem right. But that’s only because the criminals are good.</p>
<p>A person calls to inform a consumer that his or her account had been frozen because of what was supposedly a “fraudulent transfer” or some other problem. The caller sounds professional, and might even send a text with details meant to provide confirmation and assurance. The request? Transfer funds into a new account for safety.</p>
<p>But that new account will be controlled by fraudsters, who will quickly steal the money – funds that might be unrecoverable by a bank or law enforcement. Such a scenario stands as a terrifying example of not only the sophistication of criminals, but also the threat of fraud in a real-time payments environment.</p>
<p>That threat – and how to defend against it – served as the foundation of a recent PYMNTS discussion that featured Karen Webster and two fraud prevention specialists from KPMG in the U.S. – Ron Plesco, principal of Cyber Security, and Bob Ruark, principal of Banking and Financial Services Strategy and KPMG’s FinTech leader in the U.S.</p>
<p><strong>More Data</strong></p>
<p>As Plesco pointed out, criminals have managed to steal credit bureau data, giving fraudsters an in when it comes to such theft. “All that info has been mined by organized crime groups and other actors,” he said. And those criminals are experts at social engineering, enabling them to con people who might be on high alert for fraud attempts. “They can convince you that they are the bank, and even the caller ID showing on your phone will say so.”</p>
<p>That doesn’t mean all is hopeless, of course. Education of banking customers — both commercial and consumer clients — is key to preventing such fraud and reducing the risk of further attempts, Plesco and Ruark told Webster.</p>
<p>The antidote? “You need layers of security,” he noted.</p>
<p>That might mean having banks move away from knowledge-based questions for identity validation — which criminals can figure out — to biometric authentication methods, including voice and facial recognition. In a real-time payments environment, that can also mean sending a message to the customer attempting the transaction, one that confirms the legitimacy of the other party and its payment request.</p>
<p>Another technology that can help banks prevent fraud and take a more proactive approach to suspicious transactions in real time is artificial intelligence (AI).</p>
<p><strong>AI’s Role</strong></p>
<p>As Plesco explained, such a system will flag an out-of-the-ordinary transaction — a customer moving more money than is usually the case, for instance, or transacting with a new and unknown party. You can think of that as similar to the alerts credit card companies send when a consumer uses his or her card in an unusual way (or, of course, when a criminal tests that card via an unusual transaction). “You use artificial intelligence to say ‘wow, this is out of the norm,’” Plesco said. “All of our clients are moving toward that.”</p>
<p>Indeed, algorithms are taking on more of the data and security work for financial institutions, with technologies such as data mining and business rules management systems (BRMS) finding popularity among banks and credit unions, according to a new PYMNTS report entitled, “The AI Gap: Perception Versus Reality in Payments and Banking Services.” However, fewer institutions have made the move to true AI, with lack of funding and even misunderstanding of the technology serving as challenges to its wider acceptance.</p>
<p>But AI isn’t the only necessary defense when it comes to preventing fraud in an environment where consumers and corporations want faster, even real-time payments. Friction can also play a role.</p>
<p>That might seem counterproductive, given ongoing efforts to take friction out of payments (and commerce) so that consumers have quick and seamless transactions. Yet there is always a balance between security and convenience, and when it comes to fraud prevention in this global and digital era, a little more security — friction — can go a long way toward making sure thieves don’t make off with consumers’ savings.</p>
<p><strong>Holistic Defense</strong></p>
<p>A holistic approach to fraud prevention is also needed. The marketing department, for instance, accumulates loads of data that tells how consumers visit an organization’s website, and from what locations and machines, among other information. “That’s a gold mine of how your customers interact with you,” Plesco said.</p>
<p>That information can then be shared across the organization. As well, the people responsible for ID and access security should work with the people responsible for fraud prevention, and vice versa. “Look at [fraud prevention] from an enterprise level, not just a business unit level,” Ruark advised.</p>
<p>Furthermore, fraud prevention might require what Plesco called a “hybrid” approach. That means banks figuring out which of their data sets can help them defend against fraud, and determining how to access and use that information efficiently. That means using the best parts of the legacy technology and system, and then deciding whether there is a need to combine that with new technology from vendors.</p>
<p>Criminals are only getting better and more sophisticated, but the right mindset can lead to better defenses — and, perhaps, fewer fraud stories about people losing their savings.</p>
<p>The post <a href="https://www.aiuniverse.xyz/kpmg-how-ai-defense-can-counter-faster-payments-fraud/">KPMG: How AI Defense Can Counter Faster Payments Fraud</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/kpmg-how-ai-defense-can-counter-faster-payments-fraud/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
