{"id":6830,"date":"2016-07-18T09:39:17","date_gmt":"2016-07-18T13:39:17","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=6830"},"modified":"2022-06-21T05:25:01","modified_gmt":"2022-06-21T09:25:01","slug":"single-sign-sso-biometrics-replacing-passwords","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/","title":{"rendered":"Why Single Sign-On (SSO) Biometrics Is Slowly Replacing Passwords"},"content":{"rendered":"<figure id=\"attachment_6831\" aria-describedby=\"caption-attachment-6831\" style=\"width: 405px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-6831\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/07\/IT_Security_Lock_binary_-PASSWORD-.jpg\" alt=\"Biometric Single Sign-On\" width=\"405\" height=\"270\" \/><figcaption id=\"caption-attachment-6831\" class=\"wp-caption-text\">Biometrics is slowly but surely replacing passwords in enterprise Single-Sign-On authentication.<\/figcaption><\/figure>\n<p style=\"text-align: justify;\">The rise in security breaches and the increase in sophisticated hacking attacks of sensitive information has raised demand for a stronger and more secure Single Sign-On (SSO) for information access. Due to the fact that password-cracking techniques are increasing in sophistication, there is a strong need to implement more sophisticated single sign-on methods. Many are considering the advantages and efficiencies that biometric authentication brings to the table &#8211; biometrics is slowly but surely replacing passwords to provide stronger security and reliability.\u00a0Biometrics has proven to be more effective in helping businesses and enterprises increase security, convenience, and achieve realized cost savings.<\/p>\n<h2>Why ditching passwords for Single Sign-On (SSO) is becoming mainstream<\/h2>\n<p style=\"text-align: justify;\">Each day, millions of people use passwords to sign into their enterprise terminals and access valuable confidential information. Examples of services that would require the use of passwords include:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Financial service transactions<\/li>\n<li>Reading, responding, and sending email<\/li>\n<li>Physical access control to offices or buildings<\/li>\n<li>E-commerce<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">However, passwords are declining in popularity and less preferred to secure transactions and devices because they can be easily guessed, hacked or stolen. A password can also be shared, and there is no way for the system to know who the actual user is. The recent rise of data breaches proves that legacy authentication technologies are highly vulnerable and have failed to evolve in parallel with the increased sophistication of data breach threats. \u00a0Stolen passwords played a role in 48% of the data breaches that involved hacking,\u00a0<a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/the-eight-most-common-causes-of-data-breaches\/d\/d-id\/1139795?\"><strong>Verizon researchers<\/strong><\/a>\u00a0found. Business and enterprises are looking for more sophisticated technologies to secure data and maintain network security, and <a href=\"https:\/\/www.m2sys.com\/biometric-single-sign-on-sso-solution\/?utm_source=blog&amp;utm_medium=m2sys&amp;utm_campaign=SSO\"><strong>biometric authentication<\/strong><\/a> methods replacing passwords or used as part of a two factor SSO authentication are gaining popularity. Industry experts are also parsing biometric technology for use in different sectors as an effective way to replace traditional passwords.<\/p>\n<p style=\"text-align: justify;\">There are numerous reasons why passwords should be replaced with biometric identification. Let\u2019s take a look at some of them:<\/p>\n<h2 style=\"text-align: justify;\">1.\u00a0\u00a0\u00a0\u00a0\u00a0 Passwords are prone to hacking<\/h2>\n<p style=\"text-align: justify;\">One significant downside of passwords is that they can be easily hacked. If you have an eight-character password, that has 6.1 quadrillion possible combinations! If we rewind the calendar to 2011, it would have taken a year for the fastest desktop computer to crack that password. Today, thanks to new password crowd-hacking technologies, it takes an average of 5.5 hours to hack an eight character password!<\/p>\n<h2 style=\"text-align: justify;\">2.\u00a0\u00a0\u00a0\u00a0\u00a0 Passwords can be guessed<\/h2>\n<p style=\"text-align: justify;\">We usually set passwords that can be easily remembered &#8211; birthdays, spouse or children\u2019s names, website or business names for example. The problem is using a password that is tied to something personal so it can be easily remembered means that it can be easily guessed by a possible intruder.<\/p>\n<h2 style=\"text-align: justify;\">3.\u00a0\u00a0\u00a0\u00a0\u00a0 Passwords can be forgotten, lost, or stolen<\/h2>\n<p style=\"text-align: justify;\">Some people use a complex combination of characters with both alphanumeric and numeric sequences. They make these passwords so complex that they easily be forgotten. In order to remember the passwords, they may be written down somewhere, which leads to more potential issues for breaching network security plus it opens the door wider for the password to be lost or stolen.<\/p>\n<h2 style=\"text-align: justify;\">Why Single Sign-On (SSO) biometrics?<\/h2>\n<p style=\"text-align: justify;\">Biometrics are unique traits or behavioral characteristics that can be captured and used for individual identification through different biometric modalities such as: fingerprint, finger vein, palm vein, iris, facial, or voice recognition. Using biometrics for individual authentication is fast and it can instantly identify anyone within a matter of seconds. Moreover, every individual (even identical twins) has unique individual biometric characteristics. For years, law enforcement agencies and governments have been using\u00a0<a href=\"https:\/\/www.m2sys.com\/automated-fingerprint-identification-system-afis\/?utm_source=biometrics%20alternative%20passwords&amp;utm_medium=blog%20post&amp;utm_campaign=blog\"><strong>biometric technology<\/strong><\/a>\u00a0for accurate identification.<\/p>\n<p style=\"text-align: justify;\">Biometric technology is now more sophisticated and readily available for enterprises in different applications such as <a href=\"https:\/\/www.m2sys.com\/biometric-single-sign-on-sso-solution\/?utm_source=blog&amp;utm_medium=m2sys&amp;utm_campaign=SSO\"><strong>biometric single sign on<\/strong><\/a> (SSO) to protect passwords. In fact, the use of biometrics as an alternative to passwords or in combination with passwords as two factor authentication is now considered more secure to prevent data breaches due to existing, weak password protocols. Biometrics identifies individuals by \u201cwho they are\u201d which eliminates the need of remembering passwords. \u00a0Biometrics can also provide instant access to information at any place, wherever and whenever you need. In addition, biometrics are unique for every individual and prevent unauthorized access from others who may have the means to steal passwords.<\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/cloudABIS-m2sys-blog-ad.jpg\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>CloudABIS\u2122<\/span><\/h2>\r\n\t\t\t<h3>Web Api For Biometric Authentication<\/h3>\r\n\t\t\t<div class=\"ad-area-head\"><\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>Simply connect to our Biometric API to perform fast 1:N Fingerprint\/Finger-Vein\/Iris Recognition<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system\/?utm_source=What+is+biometric+verification+system%3F&amp;utm_source=Shanghai+Subway+Adopts+Voice+and+Facial+Recognition+Systems&amp;utm_source=Why+Single+Sign-On+%28SSO%29+Biometrics+Is+Slowly+Replacing+Passwords&amp;utm_medium=CloudABIS&amp;utm_medium=CloudABIS%E2%84%A2&amp;utm_campaign=blog+displayAds&amp;utm_campaign=Blog+DisplayAds\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<h2 style=\"text-align: justify;\">Benefits of using Single Sign-On biometrics to manage passwords<\/h2>\n<p style=\"text-align: justify;\">Considering the use of\u00a0<a href=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/?utm_source=biometrics%20alternative%20passwords&amp;utm_medium=blog%20post&amp;utm_campaign=blog\"><strong>biometrics to replace passwords<\/strong><\/a>\u00a0or to secure password management is beneficial for both end users and enterprises. End users can easily authenticate themselves by easily verifying their biometrics in a convenient way. Beside governments, enterprises or businesses can easily reduce password management difficulties by providing a more secure method of authentication. The use of SSO biometrics over passwords offers the following advantages:<\/p>\n<h2 style=\"text-align: justify;\">Secure authentication<\/h2>\n<p style=\"text-align: justify;\">Biometrics ensures secure logins to any access points or computer networks on the web. Biometrics protects user credentials from being stolen because biometrics are unique and can\u2019t be shared, duplicated, or easily forged.<\/p>\n<p style=\"text-align: justify;\">Faced with employee frustration and security concerns that arise from managing several different access credentials, Ugandan ICT Systems Integration Company Digital Alliance Limited implemented the\u00a0<a href=\"https:\/\/www.m2sys.com\/biometric-single-sign-on-sso-solution\/?utm_source=biometrics%20alternative%20passwords&amp;utm_medium=blog%20post&amp;utm_campaign=blog\"><strong>Enterprise Biometrics Suite\u2122<\/strong><\/a>\u00a0biometric single sign-on (SSO) solution to provide secure authentication for their employees.<\/p>\n<h2 style=\"text-align: justify;\">Higher accuracy<\/h2>\n<p style=\"text-align: justify;\">Biometric password management increases authentication accuracy by ensuring the right person has access to the right information. It can also prevent sharing passwords with another person and prevent an unauthorized person from gaining access to sensitive data.<\/p>\n<p style=\"text-align: justify;\">The Ministry of Interior and Decentralization of Mauritania<\/p>\n<h2 style=\"text-align: justify;\">Two-factor authentication<\/h2>\n<p style=\"text-align: justify;\">Biometrics ensures a high level of security by providing two factor authentication in combination with passwords. PINs and tokens can be shared, stolen or duplicated, but two factor biometric authentication is a strong solution to eliminate spoofing attacks.<\/p>\n<h2 style=\"text-align: justify;\">Prevent password stealing<\/h2>\n<p style=\"text-align: justify;\">Due to the fact that biometrics are very hard to forge and biometric templates are nearly impossible to reverse engineer eliminates the risk of stolen passwords.<\/p>\n<h2 style=\"text-align: justify;\">Reduce password reset cost<\/h2>\n<p style=\"text-align: justify;\">Due to the complex pattern of passwords to make them secure, sometimes it becomes a burden to remember them. Biometric authentication methods identify an individual by their biometrics or behavioral traits and biometric password management both relieves the burden to memorize passwords and<\/p>\n<h2 style=\"text-align: justify;\">Ease of use<\/h2>\n<p style=\"text-align: justify;\">Biometric identification methods are automated and offer very fast identification recognition. They are easy for an end user to use in order to quickly gain access to any information and offer a higher level of security and convenience.<\/p>\n<h2 style=\"text-align: justify;\">Cost effective<\/h2>\n<p style=\"text-align: justify;\">Preventing sensitive government and enterprise data breaches, implementing biometric single sign on technology protects corporate data and assets from being stolen or shared, Plus, biometrics eliminates the need for IT departments to reset passwords, reducing administrative expenses and saving resources. In a survey of more than 3,900 companies worldwide by\u00a0<a href=\"https:\/\/www.americanbanker.com\/issues\/179_176\/how-much-do-data-breaches-cost-two-studies-attempt-a-tally-1069893-1.html\"><strong>Kaspersky Lab<\/strong><\/a>, it was found that the cost of lost financial data ranged anywhere from $66,000 to $938,000 per organization, depending on the size. Adopting a biometric single sign-on solution can prevent such incidents and save financial losses resulting from data security breaches.<\/p>\n<h2 style=\"text-align: justify;\">Conclusion<\/h2>\n<p style=\"text-align: justify;\">Biometric technology is a very promising way of enterprise Single Sign-On authentication. Users may be authenticated by their personal computers or by workstations during login using their biometric traits to confirm a bank transaction or access control system to open a door. All of these cases are typical use cases for biometric SSO technology within the right environments to help replace weak password or PIN security protocols that can easily be exploited.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rise in security breaches and the increase in sophisticated hacking attacks of sensitive information has raised demand for a<\/p>\n","protected":false},"author":3,"featured_media":6831,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Single Sign-On","_yoast_wpseo_title":"Why Single Sign-On Biometrics Is Slowly Replacing Passwords","_yoast_wpseo_metadesc":"Single Sign-On Biometrics has proven to be more effective in helping businesses and enterprises increase security and realized cost savings.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[911],"tags":[558,259],"class_list":["post-6830","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-technology","tag-biometric-single-sign-on","tag-single-sign-on"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Single Sign-On Biometrics Is Slowly Replacing Passwords<\/title>\n<meta name=\"description\" content=\"Single Sign-On Biometrics has proven to be more effective in helping businesses and enterprises increase security and realized cost savings.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Single Sign-On Biometrics Is Slowly Replacing Passwords\" \/>\n<meta property=\"og:description\" content=\"Single Sign-On Biometrics has proven to be more effective in helping businesses and enterprises increase security and realized cost savings.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:author\" content=\"m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-18T13:39:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-21T09:25:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/07\/IT_Security_Lock_binary_-PASSWORD-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Trader\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Trader\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/\"},\"author\":{\"name\":\"John Trader\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16\"},\"headline\":\"Why Single Sign-On (SSO) Biometrics Is Slowly Replacing Passwords\",\"datePublished\":\"2016-07-18T13:39:17+00:00\",\"dateModified\":\"2022-06-21T09:25:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/\"},\"wordCount\":1353,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric single sign on\",\"single sign-on\"],\"articleSection\":[\"Biometric Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/\",\"name\":\"Why Single Sign-On Biometrics Is Slowly Replacing Passwords\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2016-07-18T13:39:17+00:00\",\"dateModified\":\"2022-06-21T09:25:01+00:00\",\"description\":\"Single Sign-On Biometrics has proven to be more effective in helping businesses and enterprises increase security and realized cost savings.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Why Single Sign-On (SSO) Biometrics Is Slowly Replacing Passwords\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16\",\"name\":\"John Trader\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"caption\":\"John Trader\"},\"description\":\"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com\",\"sameAs\":[\"https:\/\/www.m2sys.com\/blog\/\",\"m2sys\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/m2john\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Single Sign-On Biometrics Is Slowly Replacing Passwords","description":"Single Sign-On Biometrics has proven to be more effective in helping businesses and enterprises increase security and realized cost savings.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/","og_locale":"en_US","og_type":"article","og_title":"Why Single Sign-On Biometrics Is Slowly Replacing Passwords","og_description":"Single Sign-On Biometrics has proven to be more effective in helping businesses and enterprises increase security and realized cost savings.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_author":"m2sys","article_published_time":"2016-07-18T13:39:17+00:00","article_modified_time":"2022-06-21T09:25:01+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/07\/IT_Security_Lock_binary_-PASSWORD-.jpg","type":"image\/jpeg"}],"author":"John Trader","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"John Trader","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/"},"author":{"name":"John Trader","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16"},"headline":"Why Single Sign-On (SSO) Biometrics Is Slowly Replacing Passwords","datePublished":"2016-07-18T13:39:17+00:00","dateModified":"2022-06-21T09:25:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/"},"wordCount":1353,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric single sign on","single sign-on"],"articleSection":["Biometric Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/","name":"Why Single Sign-On Biometrics Is Slowly Replacing Passwords","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2016-07-18T13:39:17+00:00","dateModified":"2022-06-21T09:25:01+00:00","description":"Single Sign-On Biometrics has proven to be more effective in helping businesses and enterprises increase security and realized cost savings.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/single-sign-sso-biometrics-replacing-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Why Single Sign-On (SSO) Biometrics Is Slowly Replacing Passwords"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16","name":"John Trader","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","caption":"John Trader"},"description":"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com","sameAs":["https:\/\/www.m2sys.com\/blog\/","m2sys"],"url":"https:\/\/www.m2sys.com\/blog\/author\/m2john\/"}]}},"modified_by":"Matt Gibson","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/6830"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=6830"}],"version-history":[{"count":11,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/6830\/revisions"}],"predecessor-version":[{"id":16232,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/6830\/revisions\/16232"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/6831"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=6830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=6830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=6830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}