HP Tc4200 HP ProtectTools: Authentication technologies and suitability to task - Page 2

Introduction, Authentication technologies in HP ProtectTools - windows 7

Page 2 highlights

Introduction The concept of information security is based on ensuring that only authorized users have access to information. The process of verifying a user's identity is simply referred to as user authentication. User authentication is based on three traits that can be uniquely tied to an individual. These are: 1. Knowledge - What the person knows (e.g. password) 2. Possession - What the person has (e.g. USB token, smartcard) 3. Physical characteristic - Who the person is (e.g. Biometrics) Passwords depend on knowledge that only an authorized person should have. An unauthorized person who gains access to another person's password can also gain access to that person's secure information. However, if user authentication is based on the combination of two or more of the above traits, unauthorized access becomes that much harder. A number of authentication technologies currently exist that combine the above traits to provide a varying degree of balance between security, usability and cost. HP ProtectTools Security Manager supports a broad range of hardware authentication devices, such as smart cards, USB tokens and biometric fingerprint authentication, among others. Each authentication device has its strengths and weaknesses, and therefore these devices cannot be ranked in order. The appropriateness of an authentication device depends on it's suitability to task. The purpose of this white paper is to help identify the authentication devices most appropriate for a given environment by listing the authentication devices currently supported by the HP ProtectTools security manager, and describing their strengths and suitability to task. Authentication technologies in HP ProtectTools HP client PCs support a breadth of authentication devices in the Microsoft® Windows® operating system environment, as well as the pre-boot environment. This breadth of support for authentication devices gives customers a range of choices on which authentication technology to deploy. Authentication support in the Windows environment is provided by HP ProtectTools Security Manager using the Credential Manager for HP ProtectTools add-on module. Credential Manager supports multiple authentication technologies centrally, and has the capability right out of the box to combine the different authentication devices to provide multifactor authentication policies. The ability to manage multiple authentication technologies centrally from within a single application means that customers can deploy different authentication technologies across the enterprise depending on suitability to task. This also means customers can create complex authentication processes by combining two or more authentication devices for stronger security via multifactor authentication. It also raises questions for customers on what is the right technology for their environment, and the purpose of this white paper is to help answer those questions. 2

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

Introduction
The concept of information security is based on ensuring that only authorized users have access to
information. The process of verifying a user’s identity is simply referred to as user authentication. User
authentication is based on three traits that can be uniquely tied to an individual. These are:
1.
Knowledge - What the person knows (e.g. password)
2.
Possession - What the person has (e.g. USB token, smartcard)
3.
Physical characteristic - Who the person is (e.g. Biometrics)
Passwords depend on knowledge that only an authorized person should have. An unauthorized
person who gains access to another person’s password can also gain access to that person’s secure
information. However, if user authentication is based on the combination of two or more of the above
traits, unauthorized access becomes that much harder.
A number of authentication technologies currently exist that combine the above traits to provide a
varying degree of balance between security, usability and cost. HP ProtectTools Security Manager
supports a broad range of hardware authentication devices, such as smart cards, USB tokens and
biometric fingerprint authentication, among others.
Each authentication device has its strengths and weaknesses, and therefore these devices cannot be
ranked in order. The appropriateness of an authentication device depends on it’s suitability to task.
The purpose of this white paper is to help identify the authentication devices most appropriate for a
given environment by listing the authentication devices currently supported by the HP ProtectTools
security manager, and describing their strengths and suitability to task.
Authentication technologies in HP ProtectTools
HP client PCs support a breadth of authentication devices in the Microsoft® Windows® operating
system environment, as well as the pre-boot environment. This breadth of support for authentication
devices gives customers a range of choices on which authentication technology to deploy.
Authentication support in the Windows environment is provided by HP ProtectTools Security Manager
using the Credential Manager for HP ProtectTools add-on module. Credential Manager supports
multiple authentication technologies centrally, and has the capability right out of the box to combine
the different authentication devices to provide multifactor authentication policies.
The ability to manage multiple authentication technologies centrally from within a single application
means that customers can deploy different authentication technologies across the enterprise
depending on suitability to task. This also means customers can create complex authentication
processes by combining two or more authentication devices for stronger security via multifactor
authentication.
It also raises questions for customers on what is the right technology for their environment, and the
purpose of this white paper is to help answer those questions.
2