Project Summary

Two-factor authentication from WiKIDThe WiKID Strong Authentication System is a public key-based two-factor authentication system. It is flexible, extensible, and secure alternative to tokens,certs & passwords. Application support for Java, Windows, PHP, Ruby, Python, SugarCRM, webmail, OpenVPN, LDAP, TACACS+, etc. Open source token clients include a J2SE client and a Firefox extension (in beta).

The token client encrypts the user's PIN with the WiKID server's public key and sends it to the server along with a one-time use AES key. If the PIN is correct, the account active and the encryption valid, the one-time password is generated (via java random), encrypted by the token client's public key and the AES key and returned.

If the security domain is configured for https mutual authentication, a hash of the valid ssl cert and the URL are also sent with the OTP. The token client will attempt to fetch the SSL cert from the URL and hash it. If the hashes match, the URL is presented as valid and the default browser is launched to the valid website. This prevents MITM attacks against web applications.

DocumentationWe have recently published a number of how-tos:

Add two-factor authentication to Ruby

Add two-factor authentication to PHP

How to use Radius for two-factor authentication with Apache

How to prevent phishing with mutual authentication

Secure SSH with two-factor authentication

How to configure OpenVPN for WiKID

Share

 No code available to analyze

Open Hub computes statistics on FOSS projects by examining source code and commit history in source code management systems. This project has no code locations, and so Open Hub cannot perform this analysis

Is this project's source code hosted in a publicly available repository? Do you know the URL? If you do, click the button below and tell us so that Open Hub can generate statistics! It's fast and easy - try it and see!

Add a code location

Community Rating

Be the first to rate this project
 
Click to add your rating
 
Review this Project!
Sample_ohloh_analysis