Is a process to authenticate users on which requires the presentation of two or more authentication factors. For example, a user introduces a password in a system, the system sends a code, or calls to the user cell phone, the user finally authenticates by introducing the code received.
Reduces drastically the incidence of online identity theft, phishing expeditions, and other online fraud, because the victim's password would no longer be enough to give access -- but may be vulnerable to other attacks.
More information
Reduces drastically the incidence of online identity theft, phishing expeditions, and other online fraud, because the victim's password would no longer be enough to give access -- but may be vulnerable to other attacks.
More information
Subcategories 2
Related categories 1
Sites 11
Lists websites and whether or not they support 2FA.
Explains the concepts of answering the question "How do I know you're who you say you are?".
Describes the basic concepts of the authentication method, and the components: what you know, what you have, who you are.
Describes the Open Source project, client and server software implementation.
Aims to distill a comprehensive view of strong user authentication by examining its concepts, implementation approaches, and challenges/additional concerns at the architectural level.
To take into account when using them in a multi-factor authentication system.
Proof of concept. Tutorial using an image as the component "what you have".
Analyzing secure methods from the perspective of governments.
[PDF]
Guest post from a user's point of view, analyzing the usability and security of TFA.
Describes the factors used to grant the user access to the system.
Describes the approach to authentication which requires the presentation of two or more factors.
Lists websites and whether or not they support 2FA.
Explains the concepts of answering the question "How do I know you're who you say you are?".
Describes the basic concepts of the authentication method, and the components: what you know, what you have, who you are.
Describes the approach to authentication which requires the presentation of two or more factors.
To take into account when using them in a multi-factor authentication system.
Aims to distill a comprehensive view of strong user authentication by examining its concepts, implementation approaches, and challenges/additional concerns at the architectural level.
Proof of concept. Tutorial using an image as the component "what you have".
Guest post from a user's point of view, analyzing the usability and security of TFA.
Analyzing secure methods from the perspective of governments.
[PDF]
Describes the factors used to grant the user access to the system.
Describes the Open Source project, client and server software implementation.

Last update:
December 7, 2021 at 9:22:34 UTC

Check out
Regional: Europe: United Kingdom: England: Devon: Bratton Fleming
- Recently edited by merlin1
- Recently edited by merlin1