Using Two Factor Authentication To Secure Users Alan P. Barber

Slides:



Advertisements
Similar presentations
Mutual OATH HOTP Variants 65th IETF - Dallas, TX March 2006.
Advertisements

Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Fòmasyon Itilizatè Ayiti Office 365 Fòmasyon. Why the Change? Partners in Health's new hosted Microsoft Office 365 solution allows users to access their.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
We are partners in learning.. Note: Office 365 works best in Internet Explorer V 9 or above. Some features do not work in PWCS’s Chrome Browser or in.
This presentation was made to help new users to understand how the is used on the internet. The Power Point is design to advance slowly to allow.
For CCRI Students.
Confidential - © 2012 StreamWIDE © StreamWIDE
IPSOS / Vodafone / Novartis Kenya 17 December 2014.
FriendFinder Location-aware social networking on mobile phones.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Time-base One-time Password Eddy Kleinjan, Data Access Europe.
Secure Quick Reliable Login ● SQRL pronounced “squirrel”. ● Acronym confusion – QR no longer stands for “Quick Response” two-dimensional bar codes. Optional.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
Welcome to the Microsoft Outlook 2011 for the Mac Tech Talk.
Implementing and Managing Azure Multi-factor Authentication
2 Factor & Multi Factor Authentication
IT Security Awareness Day October 19, 2016
Pearson Writer.
Outline The basic authentication problem
Welcome to Customer Interaction Center (CIC) Client and Phone Training
File Management in the Cloud
Welcome to the Microsoft Outlook 2010 for Windows Tech Talk
 Gmail is a free webmail service, developed by Google.  Gmail also supports advertising.  Users can access Gmail on the desktop, laptop or through.
SAP Authentication 365 Run Simpler with SAP Digital Interconnect
How to use the internet safely and How to protect my personal data?
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
How to Fi
Two-factor authentication
Multifactor Authentication
How Can I Help?.
Multi-Factor Authentication (MFA)
Ch 8- Digital devices and media: managing a digital lifestyle
Microsoft 365 Business Customer Targeting 2/6/18
Pearson Writer.
My Settings allows a user to manage their Business Banking personal information and preferences, including: Contact information Username and Password Security.
How to introduce polling as a presenter… let’s make it easy for your audience to participate! Example instruction slide for using web voting.
Preparing to present your poll Your pre-presentation checklist
[Poltair School] 12th May
Passwords.
WEBINAR “Automation of document generation and document processing with AutoMerge” Atlanta, 10/21/2013 Clint Higley I would like to welcome everyone to.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Taewan kang, Kevin huangfu
Managing Your Literature Search Using Zotero
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
First-time Login to Business Banking:
Office 365 Identity Management
Multifactor Authentication & First Time Login
Melksham Oak Community School 14 November, 2018
Setting up an online account
[Name of School] 6 December, 2018
TaxSlayer Multi-Factor Authentication (MFA)
NEW! To meet the growing requirements for managing our courses and events, Olympic ESD 114 has partnered with a new program called pdEnroller. pdEnroller.
Important Resources These resources will help you be successful in US History Class. We’ve used some of them at school, but I’m also asking you to access.
Soon we will have a new platform to help you stay in control of your independent learning. Introducing…….
Gmail Password Recovery
Multi-Factor Authentication
HR Portal: What’s New? What’s Next?
Multi-Factor Authentication
WELCOME How to Setup Yahoo Account Key Feature in Browser? CONTACT US
Week 7 - Wednesday CS363.
Getting Started With LastPass Enterprise
NCSA Duo.
Presentation transcript:

Using Two Factor Authentication To Secure Users Alan P. Barber Passwords Don’t Work Using Two Factor Authentication To Secure Users Alan P. Barber Hello everyone! My name is Alan P. Barber. I’m a software developer from Columbus, Ohio. I’ve been programming professionally for a decade now. I currently work for a company called Improving Enterprises where I work as a consultant. I’m also the President of the Central Ohio .Net Developers Group. So, I’m here today to talk to you about two factor authentication.

Let Me Tell You A Story Let me tell you a little story about Bob…

PASSWORDS DON’T WORK The Moral Of The Story OK, maybe that’s a misnomer…I just wanted to use the title in a slide.

The REAL Moral Of The Story Passwords aren’t good for proving identity What’s the real moral of the story? Passwords aren’t secure and you cannot rely on them to prove the identity of a user.

Why can’t you trust passwords? Website hacks Viruses, Trojans, Keyloggers, Etc Man In The Middle attacks Phishing attacks The bottom line is that, there is a good chance that a user’s password is going to end up being exposed at some point.

Have I convinced you yet? Hopefully, I’ve convinced you not to trust passwords and that you need something more

The Solution Once a user provides their username and password, ask them to prove their identity. That’s simple enough but how do we do that?

Lets Talk About Multi Factor Authentication Multi Factor Authentication is a method of user access control using several separate verification factors. There are 3 classifications of factors Knowledge Something the user knows Possession Something the user has Inherence Something the user contains Before we get into 2FA lets first take a quick step back and talk about multi factor authentication in general. What is MFA?

What is Two Factor Authentication Two Factor Authentication is a way of providing identification of a user by means of two different components. A secret the user knows (password) A physical object the user has (token, phone, etc) A username and password just aren’t good enough to prove the identity of person logging onto a system. Two Factor Authentication adds the requirement of having a physical object that the user possesses to aid in the proof of their identity. We will be focusing on mobile phone software based authentication but there are also hardware devices out there designed by companies like RSA.

Why Two Factor Authentication A random hacker may know all your secrets but can’t gain access to an item you possess. Two Factor Authentication helps mitigate the damage that can be done by finding out a persons username and password.

Methods of Implementation Let’s take a look at the common methods that a user will prove their identity. Let’s look at common methods to prove identity.

Methods of Implementation Email Pros Easy for developers to implement Easy for end users Cons Email can be unreliable Not very secure Email is probably the easiest way to implement 2FA. You probably already know the users email so there’s no real setup. You just email them a login code. Problems arise with slow mail service making users wait, spam filters blocking the message, etc. Also, it’s not very secure, there have been reports of dedicated hackers hacking peoples email services to get the login codes.

Methods of Implementation SMS / Text Messages Pros Secure Easy for end users Cons SMS can be unreliable Costs money SMS is a very common method for implemented 2FA. It’s fairly secure since it’s going to be hard for a hacker to gain access to your phone to capture a SMS message. Similar to email you do run into issues with slow SMS services. Worse still it’s broken if you have no cell signal, such as when out of the country. There is also a cost for your service to send SMS via a gateway service and end users may have to pay a fee for receiving SMS messages.

Methods of Implementation Telephony / Phone Callbacks Pros Secure Good fallback for users without SMS (ex: office phones) Cons Costs money People don’t like phone calls There are two styles of phone callback utilized. First is audio recording of the passcode for you to enter on the screen. The second is a simpler method that asks you to press a key to authorize.

Methods of Implementation Tokens / Security Fob Pros Secure Easy for end users Cons Complex Implementation Cost There are time based, counter based (click a button) or challenge response (enter an input on device, it gives you a password to type in). Requires running a management server to track devices and authenticate devices.

Methods of Implementation Universal 2nd Factor Pros Secure Easy for end users Cons Limit support for the web Cost U2F was created by FIDO Alliance (Fast Identity Online). Currently only supported on Chrome but Firefox and IE edge are coming. Contains a small system on a chip with a unique code that performs computations using public/private keypair to identify you.

Methods of Implementation Mobile Authenticator App Pros Free* No need to carry another device Cons Can be confusing for end users Requires sharing a secret key A software solution, often called soft tokens) that uses a open standard to compute One Time Passwords.

3rd Party Web Services Authy (authy.com) Mobile, Desktop, Voice, SMS Duo Security (duosecurity.com) Mobile, Voice, SMS, Tokens, U2F Trustwave (trustwave.com) Mobile app, Voice, SMS There are several pay services out there to help you implement without having to do the hard work yourself.

Demo Time Enough with the slides, lets look at some code! Lets look at a quick demo to see how easy it is to add 2FA to an ASP.Net MVC webapp

One Time Passwords A subset of Two Factor Authentication that uses the generation of unique, single use login codes

One Time Passwords There are two types of One Time Passwords in use HOTP – HMAC One Time Password HOTP generates a one time password via an incrementing counter TOTP – Time-based One Time Password TOTP generates a one time password via the current time interval These are generated password that are used once and automatically changed for each use. Both are open standards. HMAC stands for hash message authentication code

HOTP – HMAC One Time Password Definition Let: K be a secret key C be a counter D be a number of desired digits HMAC(K,C) be an HMAC calculated with a SHA-1 hash algorithm Truncate() be a function that selects 4 bytes Then: HOTP(K,C,D) = (Truncate(HMAC(K,C)) & 0x7FFFFFFF) mod 10D See RFC 4226 for detailed specs: https://www.ietf.org/rfc/rfc4226.txt IETF RFC 4226 (Published in Dec 2005)

TOTP – Time-based One Time Password Definition Let: K be a secret key TN be the current time, T0 be Epoch time TS be a time step, expressed in seconds D be a number of desired digits unixtime() be a function to convert a date into POSIX.1 time HOTP(K,C,D) be a HMAC One Time Password algorithm Then: TOTP(K,TN,TS,D) = HOTP(K, ((unixtime(TN) – unixtime(T0)) / TS), D) See RFC 6238 for detailed specs: https://www.ietf.org/rfc/rfc6238.txt IETF RFC 6238 (Published in May 2011)

Phone Apps Android Google Authenticator, Authy, FreeOTP IPhone Windows Phone Microsoft Authenticator There are many different OTP based apps for all the major mobile phone platforms. Some are free, some cost money. Some are very simple like Google’s and Microsoft’s authenticator apps while others like Authy add extra features and include cloud backups and sync across devices.

Another Demo Now lets see how one time passwords work…

A Few Lasts Notes Implement multiple methods for fallback Educate your users on why 2FA is important

Thank You! Alan P. Barber Website: alanbarber.com Email: alan@alanbarber.com Twitter: @alanbarber Thank you for your time, hopefully you learned something new. I have a blog that I occasionally post stuff too and if you have any questions you can contact me via email or twitter.

Questions, comments, complaints? Ask me questions! I’ll try to answer them! Do you have any questions? http://rickandmortythings.tumblr.com/