Skip to content

Commit d5c19a3

Browse files
Fix industry concepts in strong sign-in workflows
1 parent 0adb6fd commit d5c19a3

File tree

1 file changed

+23
-4
lines changed

1 file changed

+23
-4
lines changed

content/well-architected-framework/docs/docs/secure-systems/identity-access-management/implement-strong-sign-in-workflows.mdx

Lines changed: 23 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,19 @@ breaches.
1212

1313
## What are strong sign-in workflows
1414

15-
Strong sign-in workflows involve a combination of techniques and technologies to verify a user's identity before granting access to systems. Strong sign-in workflows typically consist of **something you know** - such as a password, and **something you have** - like a physical key. Strong sign-in workflows include multi-factor authentication (MFA), biometric authentication, and adaptive authentication.
15+
Strong sign-in workflows involve a combination of techniques and technologies to
16+
verify a user's identity before granting access to systems. Strong sign-in
17+
workflows typically consist of **something you know** - such as a password,
18+
**something you have** - like a hardware token or smart card, and **something
19+
you are** - such as a fingerprint or facial recognition. Strong sign-in
20+
workflows include:
21+
22+
- **Multi-factor authentication (MFA)**: Combination of one or more sign-in factors
23+
to verify a user's identity.
24+
- **Biometric authentication**: Use of unique biological traits, such as
25+
fingerprints or facial recognition, to verify a user's identity.
26+
- **Adaptive authentication**: Contextual authentication that adjusts the level
27+
of verification based on user behavior and risk factors.
1628

1729
<VideoEmbed url="https://www.youtube.com/watch?v=L3alw3iXaio"/>
1830

@@ -25,7 +37,9 @@ should not have access to. It does not, however, ensure that unauthorized users
2537
have not improperly gained access to credentials that allow authentication to
2638
those systems or data.
2739

28-
When you implement strong sign-in workflows, you add another layer of security by validating the identity of users before granting access. When you combine strong sign-in workflows with [centralized identity
40+
When you implement strong sign-in workflows, you add another layer of security
41+
by validating the identity of users before granting access. When you combine
42+
strong sign-in workflows with [centralized identity
2943
management](/secure-systems/identity-access-management/centralize-identity-management),
3044
you have an authentication model that ensures authorized users have access to systems.
3145

@@ -37,6 +51,11 @@ providers like Okta.
3751

3852
<VideoEmbed url="https://www.youtube.com/watch?v=lBImG1mbSLs"/>
3953

54+
HashiCorp Consul service mesh allows you to securely connect services across
55+
multiple runtime platforms. Consul supports mutual Transport Layer Security
56+
(mTLS) authentication, which provides strong service-to-service authentication
57+
within the service mesh.
58+
4059
HashiCorp resources:
4160

4261
- [Multi-factor authentication with HCP](/hcp/docs/hcp/iam/mfa)
@@ -65,8 +84,8 @@ identity and access management program.
6584

6685
In this section of **Identity and access management** you learned why you should
6786
use strong sign-in workflows in conjunction with [centralized identity
68-
management](/secure-systems/identity-access-management/centralize-identity-management)
87+
management](/well-architected-framework/secure-systems/identity-access-management/centralize-identity-management)
6988
and policies that follow the [principle of least
70-
privilege](secure-systems/identity-access-management/grant-least-privilege).
89+
privilege](/well-architected-framework/secure-systems/identity-access-management/grant-least-privilege).
7190
Identity and access management is part of the [Secure
7291
systems](/well-architected-framework/secure-systems) pillar.

0 commit comments

Comments
 (0)