SlideShare a Scribd company logo
Strong, multi-factor authentication is one of the most cost efficient ways to reduce
security threats within an organization. Although many organizations are hesitant to
introduce strong authentication due to on-boarding and integration issues, we regularly
advise existing and prospective customers to at the very least consider adding it to their
developmental roadmaps.
Watch how to use OX open source for strong, mutli-step, two-factor authentication.
With the newest release of OX now available, implementing organization wide, strong
authentication has never been more flexible. Not only is the OX platform vendor neutral,
but it also supports multiple authentication providers if necessary and customizable
business logic.
So without further ado, here are the 10 +1 most common applications for Multi-
Factor Authentication in Higher ED:
1. Privileged Access (“root”, “Admin,” “System,” or similar privileged access) to large or
critical system: examples of such systems include campus ERP systems with financial
data or student records; identity management systems; centralized backup systems;
DNS servers; DHCP servers; campus web cache boxes, etc.
Typical job titles of MFA user: system administrator, database administrator, DNS
administrator
2. Core Network Devices: “Enable” access to core routers and similar privileged access
to other key network devices (including firewalls and other network security appliances
with traffic visibility)
Typical job titles of MFA user: network engineer, network security engineer
3. Physical access to critical facilities [e.g., machine rooms, telecom switch rooms, colo
facilities, other high value assets]
Typical job titles of MFA user: facilities engineer, computer operator, etc.
4. Access to institutional financial accounts (commercial bank accounts, institutional
brokerage access, etc.); note that this will typically use a credential specified by the bank,
brokerage, etc., not by campus
Typical job titles of MFA user: campus business officer, portfolio administrator, financial
manager
5. Access to HIPAA covered health data (teaching hospital patient records, on campus
health center records, testing center records, etc.)
Typical job titles of MFA user: doctor, hospital/health center administrator, insurance
billing specialist, etc.
6. Financial Aid data: because of the Department of Education special push in this area,
Financial Aid administrators get a special call out (e.g., Department of Education is
pushing 2FA hard tokens to all financial aid admins)
7. High Performance Computing Resources: many so-called supercomputer centers
require 2FA after the unfortunate Stakato attacks.
8. VPN access from off campus (punching through a campus perimeter firewall, or
accessing an especially sensitive internal network)
9. Campus Messaging (e.g., in an effort to preventing phishing and subsequent spam
runs, resulting in widespread phishing)
10. Google (pushed by Google, rather than the campus)
Plus one more (not strictly two factor, think more “alternative factor to traditional
passwords”):
Bonus:
11. Automated (machine-to-machine) connections (e.g., for things like scheduled
bulk data transfers) [think Ssh pre-shared key access]
Article resource:-http://gluu.soup.io/post/449514381/Top-10-Applications-for-Multi-
Factor-Authentication

More Related Content

PDF
staff_performance_formb
PPT
PDF
Manuel ponce resume
DOCX
End.Eng._Scott Bier_VA
PPTX
Ecmon 0.5
DOCX
RGB_Resume_09_16
PDF
Security In Oracle Database V19c
DOCX
Supervisior IT
staff_performance_formb
Manuel ponce resume
End.Eng._Scott Bier_VA
Ecmon 0.5
RGB_Resume_09_16
Security In Oracle Database V19c
Supervisior IT

What's hot (20)

PPT
Data base security
DOCX
Database security
PDF
Cloud Control Matrix
DOCX
Resume2011
DOCX
Basics of cms
PPTX
Database security
PPTX
HSPD-12 LACS
DOCX
Resume_abhishek12
PPT
Dbms ii mca-ch12-security-2013
PPTX
security and privacy in dbms and in sql database
PPTX
Database Security
DOCX
DOCX
Matt Harlow Resume Government 2-2
DOC
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
PPTX
Chapter 7
PPTX
4 Keys of a Robust Data Recovery Strategy
PPTX
Database security and 4 topics in it
DOCX
Alvin Whitaker Resume Jul 2015
PDF
FileAudit Datasheet
Data base security
Database security
Cloud Control Matrix
Resume2011
Basics of cms
Database security
HSPD-12 LACS
Resume_abhishek12
Dbms ii mca-ch12-security-2013
security and privacy in dbms and in sql database
Database Security
Matt Harlow Resume Government 2-2
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
Chapter 7
4 Keys of a Robust Data Recovery Strategy
Database security and 4 topics in it
Alvin Whitaker Resume Jul 2015
FileAudit Datasheet
Ad

Viewers also liked (13)

DOCX
Triple Pythagoras
PPTX
Presentation1
PPTX
Perkembangan bahasa indonesia
DOCX
Triptico teorema de pitagoras
PPTX
Theorem of phytagoras
PDF
Pythagorean theorem
DOCX
Tripel Phytagoras
PDF
Phytagoras
PPTX
Powerpoint teorema phytagoras
PPTX
Ppt Pembuktian Teorema pythagoras
PDF
Instrumen akreditasi rs_-_final_des_2012
PPT
Lean, Six Sigma, ToC using DMAIC project management
Triple Pythagoras
Presentation1
Perkembangan bahasa indonesia
Triptico teorema de pitagoras
Theorem of phytagoras
Pythagorean theorem
Tripel Phytagoras
Phytagoras
Powerpoint teorema phytagoras
Ppt Pembuktian Teorema pythagoras
Instrumen akreditasi rs_-_final_des_2012
Lean, Six Sigma, ToC using DMAIC project management
Ad

Similar to Top 10 applications for multi factor authentication in higher education (20)

PDF
Assessing Risk: Developing a Client/Server Security Architecture,
DOCX
Discuss the challenges of maintaining information security at a remo.docx
PPT
InsiderAttack_p3.ppt
DOCX
Carl Binder Resume Myrtle Beach address 1-24-17
PPT
Vazata Federal IaaS
DOC
Cortnie Guerra
DOC
PDF
Data Security Service Offering-v3
PDF
The Essentials | Privileged Access Management
ODP
Providing a Flexible Approach to the Inflexible World of Information Security...
PDF
Privleged Access Management
PDF
Dumpscafe CompTIA Security+ SY0-701 Exam Dumps
PDF
User_Access_IIA-LA_3-9-2016
DOCX
Mark Fambrough Résumé
PDF
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
PDF
Clearswift f5 integration
PDF
Why IAM is the Need of the Hour
PPTX
User Profiling and Technology
PDF
Csec 610 Education Organization-snaptutorial.com
PPT
Ppt Template
Assessing Risk: Developing a Client/Server Security Architecture,
Discuss the challenges of maintaining information security at a remo.docx
InsiderAttack_p3.ppt
Carl Binder Resume Myrtle Beach address 1-24-17
Vazata Federal IaaS
Cortnie Guerra
Data Security Service Offering-v3
The Essentials | Privileged Access Management
Providing a Flexible Approach to the Inflexible World of Information Security...
Privleged Access Management
Dumpscafe CompTIA Security+ SY0-701 Exam Dumps
User_Access_IIA-LA_3-9-2016
Mark Fambrough Résumé
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
Clearswift f5 integration
Why IAM is the Need of the Hour
User Profiling and Technology
Csec 610 Education Organization-snaptutorial.com
Ppt Template

More from Gluu (20)

PPSX
Gluu server for educational institutions
PPTX
Pr from our recent nstic pilot award
PPTX
The currency of identifiers
PPTX
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
PPTX
Gluu sxsw 2015 interactive picks
PPTX
17 recommended requirements for an identity and access management poc
PPTX
First o auth 2.0 and saml identity federation platform to be shown by gluu
PPTX
How & why gluu’s open source authorization and authentication platform was ch...
PPTX
East hackathon api’s for art
PPTX
Gluu’s vision
PPTX
Gluu and canonical to demonstrate instant application security using ubuntu j...
PPTX
Currency of identifiers ii
PPTX
Shibboleth identity provider (idp) what it is, and why you should consider a ...
PPTX
Federated identity and open id connect why higher ed needs ox
PPTX
Web access management using o auth2 and saml – wam 2.0
PPTX
Packt publishing book proposal api and mobile access management
PPTX
Gluu oscon submission
PPTX
Go west young federation
PPTX
 Use case for asimba as saml proxy
PPTX
Postcard from identity next 2013
Gluu server for educational institutions
Pr from our recent nstic pilot award
The currency of identifiers
Gluu founder and ceo, mike schwartz, to host open id connect 1.0 session at r...
Gluu sxsw 2015 interactive picks
17 recommended requirements for an identity and access management poc
First o auth 2.0 and saml identity federation platform to be shown by gluu
How & why gluu’s open source authorization and authentication platform was ch...
East hackathon api’s for art
Gluu’s vision
Gluu and canonical to demonstrate instant application security using ubuntu j...
Currency of identifiers ii
Shibboleth identity provider (idp) what it is, and why you should consider a ...
Federated identity and open id connect why higher ed needs ox
Web access management using o auth2 and saml – wam 2.0
Packt publishing book proposal api and mobile access management
Gluu oscon submission
Go west young federation
 Use case for asimba as saml proxy
Postcard from identity next 2013

Recently uploaded (20)

PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
System and Network Administration Chapter 2
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Softaken Excel to vCard Converter Software.pdf
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Introduction to Artificial Intelligence
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Digital Strategies for Manufacturing Companies
VVF-Customer-Presentation2025-Ver1.9.pptx
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
How to Migrate SBCGlobal Email to Yahoo Easily
PTS Company Brochure 2025 (1).pdf.......
System and Network Administration Chapter 2
Design an Analysis of Algorithms I-SECS-1021-03
Odoo Companies in India – Driving Business Transformation.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Which alternative to Crystal Reports is best for small or large businesses.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
How Creative Agencies Leverage Project Management Software.pdf
Softaken Excel to vCard Converter Software.pdf
Operating system designcfffgfgggggggvggggggggg
Introduction to Artificial Intelligence
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
wealthsignaloriginal-com-DS-text-... (1).pdf
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
CHAPTER 2 - PM Management and IT Context
Digital Strategies for Manufacturing Companies

Top 10 applications for multi factor authentication in higher education

  • 1. Strong, multi-factor authentication is one of the most cost efficient ways to reduce security threats within an organization. Although many organizations are hesitant to introduce strong authentication due to on-boarding and integration issues, we regularly advise existing and prospective customers to at the very least consider adding it to their developmental roadmaps. Watch how to use OX open source for strong, mutli-step, two-factor authentication. With the newest release of OX now available, implementing organization wide, strong authentication has never been more flexible. Not only is the OX platform vendor neutral, but it also supports multiple authentication providers if necessary and customizable business logic. So without further ado, here are the 10 +1 most common applications for Multi- Factor Authentication in Higher ED:
  • 2. 1. Privileged Access (“root”, “Admin,” “System,” or similar privileged access) to large or critical system: examples of such systems include campus ERP systems with financial data or student records; identity management systems; centralized backup systems; DNS servers; DHCP servers; campus web cache boxes, etc. Typical job titles of MFA user: system administrator, database administrator, DNS administrator 2. Core Network Devices: “Enable” access to core routers and similar privileged access to other key network devices (including firewalls and other network security appliances with traffic visibility) Typical job titles of MFA user: network engineer, network security engineer 3. Physical access to critical facilities [e.g., machine rooms, telecom switch rooms, colo facilities, other high value assets] Typical job titles of MFA user: facilities engineer, computer operator, etc.
  • 3. 4. Access to institutional financial accounts (commercial bank accounts, institutional brokerage access, etc.); note that this will typically use a credential specified by the bank, brokerage, etc., not by campus Typical job titles of MFA user: campus business officer, portfolio administrator, financial manager 5. Access to HIPAA covered health data (teaching hospital patient records, on campus health center records, testing center records, etc.) Typical job titles of MFA user: doctor, hospital/health center administrator, insurance billing specialist, etc. 6. Financial Aid data: because of the Department of Education special push in this area, Financial Aid administrators get a special call out (e.g., Department of Education is pushing 2FA hard tokens to all financial aid admins) 7. High Performance Computing Resources: many so-called supercomputer centers require 2FA after the unfortunate Stakato attacks. 8. VPN access from off campus (punching through a campus perimeter firewall, or accessing an especially sensitive internal network)
  • 4. 9. Campus Messaging (e.g., in an effort to preventing phishing and subsequent spam runs, resulting in widespread phishing) 10. Google (pushed by Google, rather than the campus) Plus one more (not strictly two factor, think more “alternative factor to traditional passwords”): Bonus: 11. Automated (machine-to-machine) connections (e.g., for things like scheduled bulk data transfers) [think Ssh pre-shared key access] Article resource:-http://gluu.soup.io/post/449514381/Top-10-Applications-for-Multi- Factor-Authentication