By Topic

Design, implementation and analysis of multi layer, Multi Factor Authentication (MFA) setup for webmail access in multi trust networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Chaudhari, S. ; Dept. of Atomic Energy, R.R. Centre for Adv. Technol. (Govt. of India), Indore, India ; Tomar, S.S. ; Rawat, A.

The obvious advantages of Multi Factor Authentication (MFA) - in terms of enhanced identity theft protection and account hijacking protection - have resulted in its large scale adoption in various security sensitive web applications. In large organizations with different authentication related security policies for Intranet, Extranet and Internet users, varying and multiple authentication implementations are required for achieving security compliance. Layered MFA setups have evolved to facilitate variable authentication implementations in secured web applications. Deploying and handling multi layered, multi factor authentication setups based on Open source freeware solutions is a challenging task for any administrator. This paper presents our work related to design, implementation and integration of a multi layered, multi factor authentication setup for securing the webmail application at our centre, using various freeware open source tools. The implementation ensures fulfillment of varying authentication requirements for Intranet, Internet and Extranet webmail users. Detailed analysis of the implemented setup in terms of compliance to authentication related security policies of our centre have also been presented.

Published in:

Emerging Trends in Networks and Computer Communications (ETNCC), 2011 International Conference on

Date of Conference:

22-24 April 2011