#MobileIDM Chat Archive

Catch the archive of the live discussion Mobile Identity Management and chime in at blogs.oracle.com/oracleidm or catch us on twitter @OracleIDM to share your thoughts

86 total views
Embed
  1. That met with a resounding "No". While most felt that a device could be a second factor of authentication, a few felt even that was wrought with security risks. As we increasingly use our mobile devices for financial transactions and such, ensure appropriate authentication AND authorization policies are in place becomes critical.
Like
Share

Share

Facebook
Google+