To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Strong authentication

From Wikipedia, the free encyclopedia

Strong authentication is a notion with several definitions.

YouTube Encyclopedic

  • 1/2
    Views:
    532
    468
  • Register a new phone for Strong Authentication with OneLogin
  • Animation SURFconext Strong Authentication

Transcription

Difference with two-factor authentication

Strong authentication is often confused with two-factor authentication (more generally known as multi-factor authentication), but strong authentication is not necessarily multi-factor authentication. Soliciting multiple answers to challenge questions may be considered strong authentication but, unless the process also retrieves "something you have" or "something you are", it would not be considered multi-factor authentication. The FFIEC issued supplemental guidance on this subject in August 2006, in which they clarified, "By definition true multifactor authentication requires the use of solutions from two or more of the three categories of factors. Using multiple solutions from the same category ... would not constitute multifactor authentication."[1]

Definitions

A commonly found class of definitions relates to a cryptographic process, or more precisely, authentication based on a challenge–response protocol. This type of definition is found in the Handbook of applied cryptography.[2] This type of definition does not necessarily relate to two-factor authentication, since the secret key used in a challenge–response authentication scheme can be simply derived from a password (one factor).[citation needed]

An other class of definitions says that strong authentication is any form of authentication in which the verification is accomplished without the transmission of a password.[citation needed] This is the case for example with the definition found in the Fermilab documentation.[3]

An other class, which has legal standing within the European Economic Area, is Strong Customer Authentication.

The Fast IDentity Online (FIDO) Alliance has been striving to establish technical specifications for strong authentication and has 250 members and over 150 certified products.[4]

Thus, the term strong authentication can be used as long as the notion strong is defined in the context of use.

See also

References

  1. ^ Board of Governors of the Federal Reserve System. "Frequently Asked Questions on FFIEC Guidance on Authentication in an Internet Banking Environment, August 15, 2006" (PDF). Retrieved 22 May 2012.
  2. ^ "Handbook of Applied Cryptography". Cacr.math.uwaterloo.ca. Retrieved 17 July 2014.
  3. ^ "Fermilab | Home".
  4. ^ "FIDO Alliance Passes 150 Post-Password Certified Products". InfoSecurity Magazine. 5 April 2016. Retrieved 13 June 2016.
This page was last edited on 15 August 2023, at 14:41
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.