Miscellaneous Authentication Technologies Flashcards
SMS
This is used as an additional layer of security where the user is authenticated and a SMS message is sent to he user’s cell phone. They then insert the code and are authenticated. there is usually a time limit associated with its use.
Token Key
Tokens can very from a hardware device that received a one-time password, that would normally last between 30-60 seconds, to the fob or card used to gain access to a building via a card reader
Push Notification
An email is sent to the user when access to their system has been received by an unusual device; for example, if I access Dropbox from a friend’s laptop
Phone Call
When someone has accessed a system, they may receive a phone call as an additional layer of security.
JavaScript Object Notation Web Token (JWT)
JWT is an internet standard where the server signs a token with its private key and sends it to a user to prove who they are. It can also be used to digitally sign documents and email. It is used by OAuth. For example, it may be passed through an HTTP header to prove the identity of a user, sometimes known as a claim.
Static Code
These codes change after a period of time, like a PIN for a smart card. These are commonly used by broadband engineers
Authentication Applications
This could be using Kerberos, who completes a Ticket Granting Ticket (TGT) session that results in a ticket that can be exchanged to give access to applications.