Or they can try to guess the secret, go away for 5 minutes, and come back again to try as the gatekeeper has a memory of a gold fish (again, might have something to do with the mead and end of the night brawls with other patrons). Unauthorised people can discover the secret by stealing the secret tablet of the gatekeeper, where the spoken secret is written. The problem is that the gatekeeper in question is not too bright (perhaps too many strong meads in the local tavern after work?). All villagers know a secret word that needs to be spoken to the gatekeeper to go through the gate. Imagine a gatekeeper of an ancient village, a burly man with a club in his hand trying to keep out the unwanted. Passwords and other weak authentication methods You can find the download link to the Authentication Guide at the end of the story. Let’s go through the major categories of these gatekeepers. Not all gatekeepers are created equal, and not all gatekeepers are suited for your needs. If your organisation has an online service for customers, it will need a gatekeeper. There are a lot of different gatekeepers out there in the market. It will enable your customers to conduct business with you while keeping others out. Your authentication solution is your gatekeeper.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |