Home > Computers > Security > Authentication > Multi-factor Authentication
Is a process to authenticate users on which requires the presentation of two or more authentication factors. For example, a user introduces a password in a system, the system sends a code, or calls to the user cell phone, the user finally authenticates by introducing the code received.
Reduces drastically the incidence of online identity theft, phishing expeditions, and other online fraud, because the victim's password would no longer be enough to give access -- but may be vulnerable to other attacks.
http://netsecurity.about.com/od/quicktips/qt/twofactor.htm
Describes the basic concepts of the authentication method, and the components: what you know, what you have, who you are.
http://www.computerworld.com/s/article/44257/Authentication
Explains the concepts of answering the question "How do I know you're who you say you are?".
http://www.ibm.com/developerworks/aix/library/au-security_auth/
Approach for designing and implementing a multi-security mechanism with multi factor authentication for AIX and UNIX systems.
https://lwn.net/Articles/470764/
Describes the Open Source project, client and server software implementation.
http://msdn.microsoft.com/en-us/library/cc838351.aspx
Aims to distill a comprehensive view of strong user authentication by examining its concepts, implementation approaches, and challenges/additional concerns at the architectural level.
http://www.techrepublic.com/blog/it-security/implementing-multi-factor-authentication-what-to-consider/
To take into account when using them in a multi-factor authentication system.
http://security.idlecircuits.com/twofactor.html
Proof of concept. Tutorial using an image as the component "what you have".
http://www.fedtechmagazine.com/sites/default/files/109033-wp-two-factor_auth_df.pdf
Analyzing secure methods from the perspective of governments.
http://venturebeat.com/2013/05/01/two-factor-authentication/
Guest post from a user's point of view, analyzing the usability and security of TFA.
http://www.kunal-chowdhury.com/2013/05/what-is-two-factor-authentication.html
Describes the factors used to grant the user access to the system.
https://en.wikipedia.org/wiki/Multi-factor_authentication
Describes the approach to authentication which requires the presentation of two or more factors.
Home > Computers > Security > Authentication > Multi-factor Authentication
Thanks to DMOZ, which built a great web directory for nearly two decades and freely shared it with the web. About us