Mobile

2/28/2012
09:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

OneLogin Debuts Mobile One-Time Password App At RSA Conference 2012

Available on all major smartphone platforms

Click here for more articles.

SAN FRANCISCO, Feb 28, 2012 (BUSINESS WIRE) -- OneLogin, the innovation leader in cloud-based identity management services, today announced the debut of its mobile one-time password (OTP) app, which lets users perform multi-factor authentication with the click of a button. Available on all major smartphone platforms, including iPhone, Android, Windows Mobile and BlackBerry OS 6 and 7, the app is free with every OneLogin plan. OneLogin is providing demos of the app starting today at RSA Conference 2012, Booth 655.

The one-time password app provides secure access to corporate VPNs, Box, Google Apps, Salesforce, and other cloud apps with a second authentication factor beyond user name and password. When a user is prompted for a one-time password on OneLogin's login page, they are asked to launch the mobile OTP app and click "send" versus having to type their code into the login screen. OneLogin then validates the code and logs in the user. As a fallback solution, users can enter the one-time password manually if their mobile phone is disconnected from the network.

"Multi-factor authentication provides a dramatic improvement to cloud security," says Thomas Pedersen, founder and CEO of OneLogin. "In the past, multi-factor authentication came with a host of costs, but we are excited to deliver this at no additional charge to our customers as part of every plan."

To begin using the app, users can simply request from their OneLogin sign-in page that a text or email with a download link be sent to their mobile device. Upon installation, the mobile app generates a unique credential ID tied uniquely to the OneLogin user. This ID is then registered, at which point the user chooses a valid one-time password for signing into OneLogin.

For a demo of OneLogin's mobile one-time password app, please visit booth 655 at RSA Conference 2012 or contact [email protected] or 1-855-426-7227.

About OneLogin

OneLogin provides the fastest path to identity management in the cloud with an on-demand solution consisting of single sign-on, multi-factor authentication, directory integration, user provisioning and a catalog with thousands of pre-integrated applications, including AtTask, Box.net, DocuSign, EchoSign, Google Apps, LotusLive, NetSuite, Salesforce.com, Successfactors, WebEx, Workday, Yammer, Zendesk and ZScaler. OneLogin, Inc. is backed by Charles River Ventures. Free Trial Available at: www.onelogin.com | Twitter: @onelogin.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WSJ Report: Facebook Breach the Work of Spammers, Not Nation-State Actors
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/19/2018
The Browser Is the New Endpoint
Rajesh Ranganathan, Product Manager at ManageEngine,  10/23/2018
Good Times in Security Come When You Least Expect Them
Joshua Goldfarb, Co-founder & Chief Product Officer, IDRRA ,  10/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.