In today’s digital age, securing passwords is essential for safeguarding your personal data and online accounts. One effective method for password protection is hashing, a one-way data transformation process that converts data into an unreadable format.
When you create or change a password on our platform, we apply a powerful hashing algorithm. This digital fingerprint, or hash, cannot be reversed to reveal the original password. It’s securely stored and protected from unauthorized access, even if the database is compromised.
Beyond basic hashing, we implement pepper and salt as additional security measures. Pepper is a random value added before hashing, while salt is randomly added during the hashing process. With these two elements and a unique hashing algorithm, attackers would need both the original password and the specific pepper and salt values to generate a matching hash, making it harder for them to gain access.
An Identity Provider is an external entity responsible for managing user authentication and authorization processes. It handles registration, login, and session management. When users log into an application using their IDP credentials, the application relies on the IDP to validate those credentials and return information about the user’s identity.
A Service Provider is a platform or application that offers access to specific resources or services to its users. It trusts the Identity Provider to authenticate and provide valid user identities, allowing for secure access to these resources or services. The SP receives the necessary authentication information from the Identity Provider in the form of an assertion.
A Resource Provider/Server is the entity responsible for managing or hosting specific data, applications, or services that users want to access. It ensures the secure transmission and usage of user identities and other sensitive information by employing encryption and proper authentication mechanisms like Single Sign-On.
Security Assertion Markup Language (SAML) is a widely used standard for exchanging authentication and authorization data between Identity Providers and Service Providers. A SAML request contains necessary information for the Identity Provider to initiate an authentication flow, while a SAML response contains user identity and attribute information that is then used by the Service Provider for access control and session management.
Open Authorization (OAuth) is another widely adopted protocol used for authorizing third-party applications to access specific resources or services on behalf of an end-user. OAuth focuses more on granting limited access to resources rather than handling the full authentication flow like SAML does.
There are several types of OAuth flows based on the specific use case and interaction between components. The most common ones include the Authorization Code Grant, Implicit Grant, Resource Owner Password Credentials Grant, Client Credentials Grant, and Device Authorization flow. In general, the OAuth process involves the following steps:
Address: Alsa Sheridan, 12-B, Sridharan St, Ayyavoo Colony, Aminjikarai, Chennai, Tamil Nadu 600029
Address: S-23, SIPCOT Industrial park, Pillaipakkam, Tamil Nadu 602105
Address: SP-153 2nd Floor, 9th Ln, near Coffee Day, Ambattur Industrial Estate, Chennai, Tamil Nadu 600058
12-B, Alsa Sheridan, Sreedharan Street,
Aminjikarai, Chennai-29,
Tamilnadu,
India