Authentication Design & Management
1 Day Masterclass or
7 Hours Self Paced Video
The Why: To provide a virtual workshop for industry leaders, practitioners and consultants looking to develop authentication systems for both B2E, B2C and IoT/Machine ecosystems.
For Who: Your Current Role: Information leader, CISO, identity architect, security architect, CIO, digital consultant
Pre-Reqs: Infrastructure understanding, digital concepts, basic security, basic identity. This is a no-code course.
The What: 6 modules of deep dive learning content – covering standards, design planning, deployment use cases and measurement.
~7 hours of video material.
Authentication Design & Management Part 1
Part 1 focuses on the basics of authentication – something you know, something you are and something you have – and some assumptions and first principles regarding authentication protocol design.
Definitions
The differences between something you know, something you are and something you have – and how MFA combines two from the three.
We also look at authorization and assurance.
First Principles
We analyse the concept of entity authentication, an authentication protocol (with messages, flows, actions and assumptions) before tackling the problem of freshness and replay prevention.
Authentication Design & Management Part 2
Part 2 focuses on the industry standards that exist with respect to authentication – providing a high level view of their components, usage and vulnerabilities. Part 2 also takes a look at deployment design considerations for B2E, B2C and IoT/Machine based environments.
Standards Overview
A look at some of the established, current and emerging standards and projects that pertain to authentication including:
FIDO, FIDO2/WebAuth/Passkeys, NIST 800-63-B, PSD2-SCA, OATH (TOTP/HOTP), Kerberos, RADIUS, OIDC, SAML, OWASP and Mitre Att&ck.