Articles tagged with: #sso Clear filter
Leaking URLs

Leaking URLs

cybersecurity www.reddit.com

Strange situation I'm looking for some advice on. We have an internal web app, that whilst hosted publicly in the cloud, has strong access controls (SSO to our IdP) and shows no signs of having been breached. However, we're seeing sporadic requests from various countries to suspiciously specific paths that shouldn't be public knowledge. These requests aren't authenticated, so they are redirected to the login screen. This means they're essentially harmless, but it's perplexing how people know...

Beyond SSO: Mobile Money Authentication for Inclusive e-Government in Sub-Saharan Africa

Beyond SSO: Mobile Money Authentication for Inclusive e-Government in Sub-Saharan Africa

cs.CR updates on arXiv.org arxiv.org

arXiv:2509.20592v1 Announce Type: new Abstract: The rapid adoption of Mobile Money Services (MMS) in Sub-Saharan Africa (SSA) offers a viable path to improve e-Government service accessibility in the face of persistent low internet penetration. However, existing Mobile Money Authentication (MMA) methods face critical limitations, including susceptibility to SIM swapping, weak session protection, and poor scalability during peak demand. This study introduces a hybrid MMA framework that combines...

The Auth Shim: A Lightweight Architectural Pattern for Integrating Enterprise SSO with Standalone Open-Source Applications

The Auth Shim: A Lightweight Architectural Pattern for Integrating Enterprise SSO with Standalone Open-Source Applications

cs.CR updates on arXiv.org arxiv.org

arXiv:2509.03900v1 Announce Type: cross Abstract: Open-source software OSS is widely adopted in enterprise settings, but standalone tools often lack native support for protocols like SAML or OIDC, creating a critical security integration gap. This paper introduces and formalizes the Auth Shim, a lightweight architectural pattern designed to solve this problem. The Auth Shim is a minimal, external proxy service that acts as a compatibility layer, translating requests from an enterprise Identity...

Multiple Vulnerabilities in NetScaler ADC and NetScaler Gateway Could Allow for Remote Code Execution

Multiple Vulnerabilities in NetScaler ADC and NetScaler Gateway Could Allow for Remote Code Execution

Cyber Security Advisories - MS-ISAC www.cisecurity.org

Multiple Vulnerabilities have been discovered in NetScaler ADC and NetScaler Gateway, which could allow for remote code execution. NetScaler ADC is a networking product that functions as an Application Delivery Controller (ADC), a tool that optimizes, secures, and ensures the reliable availability of applications for businesses. NetScaler Gateway is a secure remote access solution that provides users with single sign-on (SSO) to applications and resources from any device, anywhere. Successful...

How safe is 'Windows Hello' for a business environment as suppose to just regular passwords or pins on corporate devices?

How safe is 'Windows Hello' for a business environment as suppose to just regular passwords or pins on corporate devices?

cybersecurity www.reddit.com

If anyone has any real world examples in corporate environments of how safe it is or isn't, can you please elaborate on your experiences? If you didn't end up opting for it, what did you use instead and more importantly, why did you make that decision? If some users didn't want to opt for it, how did you handle the decision and problem to deploy it? Was there buy-in first or was this part of an IT policy? If you did opt for it, is it seamless with SSO with M365 stack and any other apps outside...

Does VPN SSO with Windows Hello for Business satisfy MFA requirements?

Does VPN SSO with Windows Hello for Business satisfy MFA requirements?

cybersecurity www.reddit.com

I'm thing about moving our remote access from RADIUS app-based 2FA to SAML Single Sign-On (SSO) on our firewall VPN. All users sign into Microsoft Entra ID - joined laptops with Windows Hello for Business (WHfB) (PIN, fingerprint, or facial recognition). Since WHfB uses a TPM-bound key on the device (something you have) plus PIN/biometric (something you know/are), Microsoft recognizes it as MFA. When the VPN connection is made via SAML SSO, Entra ID passes the MFA claim into the VPN session....