Thursday, August 31, 2017

The Next Gen Skype Meetings No Sign Up No Client Meetings

The Next Gen Skype Meetings No Sign Up No Client Meetings


image

Microsoft keeps rolling out new features in the Skype product and I just got a moment to play with some of the new Skype meeting features, which are quite impressive. The features I will underscore:

Frictionless Meetings with No Sign-Up/Login Whatsoever Directly from a Browser

Just go to www.skype.com and click on �Start a conversation� (Note: make sure you are not logged into your Microsoft account to see pure guest functionality.) Type in a name for yourself, and the meeting is in progress.

Nice Chat/Audio/Video Meeting Functionality�Without a Login

From playing with it the functionality seems quite nice. The guest user who sets up the meeting is the Admin and can do quite a bit:

  • 1-name the meeting
  • 2-Just give anyone an URL and they can join without a login as well
  • 3-toggle whether you want to hear notification on each IM
  • 4-make chat history available for new joiners
  • 5-Easily toggle allowing new people join (toggling this off means no one can join while it is off, but as soon as you toggle it on the original join URL works again)
  • 6-remove a user from the group/meeting
  • 7-change the picture for the meeting

image

What is the Capacity?

I was in a meeting that Tom Warren started and noticed that at that time there were 499 participants! (I noticed on the webpage I would get some script timeouts, not sure if my pc needs a reboot or not)

500-chat-participants

Note, the above was a chat (instant message) meeting only.

Edge Browser Seems to Need No Plugin for Audio/Video

IE and Chrome do.

How to Easily Avoid Joining Using the Skype Client?

Just cancel the browser request to use the Skype client

image

Then click �Join Conversation� on the web page

image

What Collaboration Methods are supported?

  • Video
  • Group Chat
  • Voice
  • Share Photos and Files
  • Send Emoticons & Mojis

Note: Desktop sharing is not supported.

image

Conclusion

I�m impressed. It would be quite cool to have an API where you could do an http post and give your name and it would return the meeting URL. But in any event, this is nice functionality.

Try it yourself in a minute: Just go to www.skype.com and click on �Start a conversation��


download file now

Continue reading ...

Thursday, August 3, 2017

The Single sign on universal login security debate

The Single sign on universal login security debate



The more apps and websites we register with, the more usernames and passwords we need to remember. You might end up managing hundreds which as you know means you have to find somewhere to store them as well as avoiding using the same password for more than one website. Your digital identity is your offline identity too.

So how could you go about reducing this number while at the same time increasing the security? OneID is one company I�ve been researching recently. They provide a Single-Sign-On (SSO) service and form filler. The SSO component is loosely based on the OpenID Foundation open authentication standard.

OneID�s architecture is actually very simple. You verify your digital identity with a password via an active device and a control device i.e. browser, app or physical device. The active physical device in this example would be the PC. A verification is then sent to your mobile* for user verification. This works on the principle that if someone has stolen your mobile they will need your PC to access your OneID network. Call it two-step verification, if you want. Users also don�t need to remember credit card numbers as this data is encrypted and isn�t stored on a central server, it�s stored in the cloud but the key isn�t. More on the signature keys in the next paragraph.

*Think Over-the-Air (OTA) and One-Time-Password (OTP) here.

There is also the option of using a one-time pin (known as an �out-of-band� service) to verify your digital identity. This acts like a signature verification system rather than a password. This means if the system is hacked, only the pin is exposed, not the passwords. The keys that are used for the signatures would need to agree with those stored when the user first authenticated to OneID. If someone other than the OneID user attempts to replace the stored keys, the authentication will fail. Equally important the pins are not stored on the centrally stored database as they can only be used once � hence �One-Time-Pins�.

The idea is that users can manage all their devices and data through OneID, but the major drawback here is websites adopting the system in the first place. I�ve already seen similar services fail to attract mass market adoption, which in my mind is a shame. There is also the small issue of privacy. Universal login (SSO) provides companies with access to user profile, demographic, surfing behaviour, usernames/ID and other data, so I�m not entirely sure users will adopt this on mass.

Also, I believe these types of SSO need full support from Capitol Hill in the US and other governments and maybe say Facebook or Twitter. The current thinking is all about shared secret authentication, which isn�t the answer. Right now OneID and OpenID remain committed to providing universal login security but something tells me it might be an uphill struggle given OpenID to date hasn�t been that successful with market adoption. Ok readers, let me know your thoughts!

download file now

Continue reading ...