{"id":47072,"date":"2021-01-22T03:01:21","date_gmt":"2021-01-21T17:01:21","guid":{"rendered":"http:\/\/www.rjmprogramming.com.au\/ITblog\/?p=47072"},"modified":"2021-01-21T17:12:29","modified_gmt":"2021-01-21T07:12:29","slug":"two-factor-authentication-primer-tutorial","status":"publish","type":"post","link":"https:\/\/www.rjmprogramming.com.au\/ITblog\/two-factor-authentication-primer-tutorial\/","title":{"rendered":"Two Factor Authentication Primer Tutorial"},"content":{"rendered":"<div style=\"width: 230px\" class=\"wp-caption alignnone\"><a target=_blank href=\"http:\/\/www.rjmprogramming.com.au\/Mac\/tfa.gif\"><img decoding=\"async\" style=\"border: 15px solid pink;\" alt=\"Two Factor Authentication Primer Tutorial\" src=\"http:\/\/www.rjmprogramming.com.au\/Mac\/tfa.gif\" title=\"Two Factor Authentication Primer Tutorial\"  style=\"float:left;\"   \/><\/a><p class=\"wp-caption-text\">Two Factor Authentication Primer Tutorial<\/p><\/div>\n<p><a target=_blank title='Two factor authentication information from Wikipedia' href='https:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication'>Two Factor Authentication<\/a> has been the response of many software developers towards measures to shore up security on their products, regarding &#8220;Identity Theft&#8221;.  This method of confirming a real human&#8217;s identity &#8230;<\/p>\n<blockquote cite='https:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication'><p>\nMulti-factor authentication (MFA) is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something the user and only the user knows), possession (something the user and only the user has), and inherence (something the user and only the user is).[1]<br \/>\n<br \/>\nTwo-factor authentication (also known as 2FA) is a type, or subset, of multi-factor authentication. It is a method of confirming users&#8217; claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.\n<\/p><\/blockquote>\n<p> &#8230; is, of course, a major step forward for software to know it is reaching the real audience it was intended for.  We have seen it most with &#8220;2) Something they have&#8221; above, in practice.   A software component will get you to login to their software, as well as get you to verify a third identifier (on top of username and password) on an associated (usually) mobile device you create the association with on signing up with that software.<\/p>\n<p>Two mobile device apps we&#8217;ve used in this <a target=_blank title='Two factor authentication' href='https:\/\/www.google.com\/search?q=two+factor+authentication&#038;rlz=1C5CHFA_enAU832AU832&#038;oq=two+factor+authentication&#038;aqs=chrome..69i57j0l4j69i61.6719j0j7&#038;sourceid=chrome&#038;ie=UTF-8'>two factor authentication<\/a> line of work are &#8230;<\/p>\n<ul>\n<li><a target=_blank title='VIP Access by Symantec' href='https:\/\/vip.symantec.com\/'>VIP Access<\/a> by Symantec<\/li>\n<li><a target=_blank title='VIP Access by Symantec' href='https:\/\/www.pingidentity.com\/en.html?utm_source=Paid%20Search&#038;utm_medium=cpc&#038;utm_content=aus-brand-ppc&#038;utm_campaign=brand&#038;gclid=Cj0KCQjwjOrtBRCcARIsAEq4rW7lSlCeDIrnjHfCItkxkIHxDExkKFoV931v3pAs9WiTKWQaPRiR4cYaAicXEALw_wcB'>Ping Identity<\/a><\/li>\n<\/ul>\n<p> &#8230; both of which offer the security service of providing a randomised large integer third proof of identity to match up with the software product sign in at a given snapshot of time.  Secure and simple, but asking for lots of proof!  In this day and age, though, with more and more mission critical software entering the scene, a growing requirement.  We&#8217;ll leave you with <a target=_blank title='What is Two-Factor Authentication (2FA) and How Does It Work?' href='https:\/\/searchsecurity.techtarget.com\/definition\/two-factor-authentication'>What is Two-Factor Authentication (2FA) and How Does It Work?<\/a>&#8216;s excellent image to explain Two Factor Authentication, below &#8230;<\/p>\n<p><img src='\/\/cdn.ttgtmedia.com\/rms\/onlineImages\/security-twofactor_authentication_half_column_desktop.jpg' title='Two Factor Authentication'><\/img><\/p>\n<p>If this was interesting you may be interested in <a title='Click here to see topics in which you might be interested' href='#d47072' onclick='var dv=document.getElementById(\"d47072\"); dv.innerHTML = \"&lt;iframe width=670 height=600 src=\" + \"https:\/\/www.rjmprogramming.com.au\/ITblog\/tag\/security\" + \"&gt;&lt;\/iframe&gt;\"; dv.style.display = \"block\";'>this<\/a> too.<\/p>\n<div id='d47072' style='display: none; border-left: 2px solid green; border-top: 2px solid green;'><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Two Factor Authentication has been the response of many software developers towards measures to shore up security on their products, regarding &#8220;Identity Theft&#8221;. This method of confirming a real human&#8217;s identity &#8230; Multi-factor authentication (MFA) is an authentication method in &hellip; <a href=\"https:\/\/www.rjmprogramming.com.au\/ITblog\/two-factor-authentication-primer-tutorial\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,37],"tags":[3377,3544,218,3545,846,3546,2923,1114,3131,1166,2059,1319,3128,1563],"class_list":["post-47072","post","type-post","status-publish","format-standard","hentry","category-elearning","category-tutorials","tag-bank","tag-banking","tag-code","tag-log-in","tag-notification","tag-passwoprd","tag-payment","tag-security","tag-sign-in","tag-software-2","tag-transaction","tag-tutorial","tag-two-factor-authentication","tag-username"],"_links":{"self":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts\/47072"}],"collection":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/comments?post=47072"}],"version-history":[{"count":5,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts\/47072\/revisions"}],"predecessor-version":[{"id":51491,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/posts\/47072\/revisions\/51491"}],"wp:attachment":[{"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/media?parent=47072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/categories?post=47072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjmprogramming.com.au\/ITblog\/wp-json\/wp\/v2\/tags?post=47072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}