SAML: DEFINITION AND PRINCIPLES OF OPERATION THROUGH A VPN TUNNEL IN SECURE INFORMATION NETWORKS
DOI:
https://doi.org/10.31891/2219-9365-2022-72-4-4Keywords:
VPN system, SAML, two-factor authentication, remote workplacesAbstract
The article raises issues of remote connection users to workplaces. The technologies for achieving a secure connection and the implementation of two-step authentication of registered persons of the internal network are analyzed, which allows increasing the productivity of workers through access to files and system resources. The considered technology makes it easier to work with other colleagues working in the office or in other places. Organizations can hire the best talent from anywhere in the world, delivering improved product quality without additional overhead. An analysis of the principles providing remote access using VPN has been carried out. VPN is shown to have been designed to allow branch offices to securely access an organization's programs. Thus, it provides an encrypted and secure connection to the network. The features of setting up remote access are determined, which is important for remote workers, since it gives them direct access to the organization's resources without being in the office. Users can connect to the network from different areas around the world using their devices. It has been determined that when setting up remote access, IT staff can access a remote device without being physically present. It is determined that security is improved by encapsulating the data in an encrypted tunnel that protects it from interception. This is especially important for remote workers, who often connect through insecure infrastructure, such as public Wi-Fi at a hotel, airport, or home. The method of remote work adopted by several organizations has been proven to have important benefits, but comes with new risks that can destroy the entire company. The requirements for ensuring proper corporate security when implementing a remote work system are described, guided by remote access connection protocols. It has been proven that secure data exchange is important in the conditions of modern information technologies, when real tasks are performed with the requirement of high efficiency. It is shown that due to the emergence of predictable threats to stay at the enterprise, it becomes necessary to study the secure connection and authorization of users to their workplaces.