Blog post -

WebCrypto, Invisible Token and Hybrid Access Gateway

After following the development of WebCrypto for more then three years it is awesome to see how it now slowly becomes implemented by the larger browsers. You can test your browser here.

WebCrypto opens up for very interesting possibilities by enabling native crypto support and secure key storage for web applications (if its secure could absolutely be discussed but it is much better then what we have previously had).

One of the interesting possibilities is an update of Invisible Token. Invisible Token is an authentication mechanism that makes your browser to your second factor by deploying a seed in the browser. When this was first implemented we where limited to local storage for the seed storage. With the introduction of WebCrypto we can import the seed (HMAC key) as non-exportable. In this way it is will be hard for the user or an attacker to extract the seed adding strength to the browser as second factor.

To make use of the WebCrypto implementation of Invisible Token you first need to upgrade to Hybrid Access Gateway 5.6 and then re-create the Authentication Method. It will not be automatically upgraded.

Topics

  • Data, Telecom, IT

Regions

  • England

Contacts

Related content

  • Six themes drive identity management in 2016

    For neXus, the leading global provider of security solutions and services, identity management will be one of the central issues in the context of IT security in 2016. The trends such as continuous flexibilization in the working environment, new forms of customer communication and the growing number of cyber-attacks are responsible for this.

  • neXus appoints new CFO

    Magnus Karlsson joins neXus as CFO on February 22, 2016, becoming a new member of the group management. Magnus succeeds Björn Johansson, who has decided to seek new challenges outside the group after nine years with neXus.

  • neXus supplies service card solutions to municipality of Ale

    Municipality of Ale has negotiated a solution for the production and administration of service cards for all its employees. The management of the municipality wanted all personnel to have secure identification that could also be used for secure login, and for access, print-on-demand etc.

  • The SCIM standards just grew up to become RFC's

    Integrity and simplicity for both users and IT-departments just took a huge step forward on the Internet. The SCIM specifications, System for Cross-Domain Identity Management, are now published as publications by the Internet Engineering Taskforce (IETF) as RFC7643 and RFC7644. At neXus we are super proud because we have been playing a key part of the specifications.

  • The Hacked Jeep is not alone

    A recent article in Wired shows how the threat is real and even though causing accidents might not be the prime target it points out that we need to take what we have learnt when opening up systems and API to the IoT world and not just care about remote access to IoT, its also about how different objects in the near perimeter act and are authorized to act.

  • The IETF #93 meeting is wrapping up and it was a great week

     An very intensive Internet Engineering Task Force (IETF) week in Prague is just winding down. It’s been a great week in warm and welcoming Prague. IETF works on the specifications that together form the Internet and IETF attendees meets three times a year to try to make the internet, slowly but consistently, a better place. The gathering consists of quick presentations and long discussions in

  • Securing banking solutions

    ​How can neXus help securing banking solutions for authentication, verification and signatures for the next generation of banking services? Meeting and attracting new customers in a disruptive banking market thru new mobile channels is a big challenge!

  • Explosion in IoT reveals risk of massive black market

    In a recent report Gartner predicts that by 2020 over 50% of new major business process and system will incorporate some element of the Internet of Things. From a security perspective this growth will ...

  • Identity data capture and validation is key

    This week I had the pleasure of visiting NORSIS event IDentitet 2016 in Oslo. Very well structured the event started with presentations around the capturing and validation of identity data which is fundamental for the trust in eIDs (and of course other types of credentials).

  • Server Name Indication and Hybrid Access Gateway

    ​SNI is an extension to TLS that has been around for a while, since 2003, but is becoming more and more important as installations become multi tenant with customers from completely different organizations.