Quantcast
Channel: Aerohive Networks | Aerohive Networks
Viewing all articles
Browse latest Browse all 392

Rethink authentication to create an intelligent network

$
0
0

Over the course of Wi-Fi networking history, authentication has remained relatively unchanged.

Most Wi-Fi networks require a password, some require username and password, and even fewer use certificate-based authentication. And don’t forget that there are still many open Wi-Fi networks out there.

This can prove challenging for end users and IT as consumerization becomes the driving force behind technology advancement in business.

These workflows were designed for yesterday’s devices. Today, employees have a wide variety of “connected” devices, whether personal or business. 

For myself, I see this as an opportunity to rethink authentication, i.e., on-boarding, in the broader sense of visibility and therefore, tighter controls.

  • Can we create workflows where authentication as a repetitive end-user task is minimized?
  • And in minimizing the authentication workflow, can we enhance the visibility for IT?

The answer is yes.

One approach being investigated is to apply consumer technologies to business workflows to streamline on-boarding processes. 

QR Codes

Take QR codes as an example. We see them everywhere and they serve many purposes. One such use is Wi-Fi QR codes, where the authentication information is embedded into the code.

Just scan the QR code and you are automatically connected to the Wi-Fi network and you never have to type a passcode. Rethink conventional QR codes from being static to dynamic and used for starting a workflow instead of ending one.

Apple Passbook

Another approach is to tap into Apple’s Passbook and our own HivePass technology. HivePass provides a framework for location and when combined with authentication, you have a few more variables to work with.

This makes geofencing more practical and usable for the end user and IT administrator.

The goal is to make authentication transparent and seamless for the end user. This means you have increased visibility and more importantly, tighter controls. Imagine a process where the password is entered automatically and never exposed to the end user. You now have the flexibility to employ complex, unique passwords for each user and device, i.e., identity without the complexity of certificates but with all the benefits.

These are some of the ways we are looking to bring authentication into the modern world and tap into the intelligence inherent in the network and systems. As I mentioned, our primary goal is to simplify on-boarding to increase visibility and provide tighter controls.


Viewing all articles
Browse latest Browse all 392

Trending Articles