Gartner®: Avoid Mobile Application Security Pitfalls

GET REPORT

Gartner®: Avoid Mobile Application Security Pitfalls

GET REPORT

Understanding non-human authentication in software development

Most authentication on the internet is not done by humans, it is done by computers or Non-Human Entities, which may sound like a Si-Fi concept but is very real.  The CPO of Otterize Otterize Uri Sarid explains exactly what is non-human authentication and why it is critical to modern software development.

Video Transcript

could maybe just walk us through a high level of that problem set like how how is authenticating and authorizing non-human entities different than working with humans sure um so first thing is when you when you put it that way non-human entities it sounds like we're talking about some mysterious thing but the reality is that most of the world of software right if you look at the back end of most of the software uh and these days that's a huge part of our world is Services talking to each other right um yes there are humans involved of course right when you buy something uh there's a human buying it uh unless it's of course Google Assistant that's buying it for you but to a large extent everything that happens after that is service is talking to each other so really the the human to service authentication and authorization while it's critical is only the the uh the top of an iceberg of services talking to each other um and I saw a lot of this of course in my previous position a CTO mulesoft where we were integrating Services together that's the majority of the work is how do you make Services talk to each other and so what we're here to do is to make sure that that you're also making sure that only services that are supposed to talk to each other are doing so just like you're making sure that only humans that are supposed to talk to the services are doing so that's really the the framing of the problem it's service to service authentication and authorization sometimes because you really want to make it more secure than what it is now sometimes because it's just obvious that that's the way you connect you know when you connect to a shared platform like RDS you're always authenticating an authorized authorizing there's no such thing as doing it without that so we just want to make that really really simple the outcome is of course a much more secure infrastructure or environment that you have but sometimes it's to make things easy it's sometimes it's to make things secure