Presentation is loading. Please wait.

Presentation is loading. Please wait.

2 Factor & Multi Factor Authentication

Similar presentations


Presentation on theme: "2 Factor & Multi Factor Authentication"— Presentation transcript:

1 2 Factor & Multi Factor Authentication
A product delivered by

2 YubiKeys Two factors. One touch. Zero client software.
YubiKey 4 Nano YubiKey NEO Tord This slide shows the two form factors of the YubiKey. To authenticate with a YubiKey you place it in the USB port with the keychain size and tap the blinking light in the gold area. For the nano size, you YubiKey fits entirely inside the USB port and you just touch the golden area to generate your login credentials. When you touch the YubiKey you are just verifying that you are a real human being and not a trojan – remember that this is not a biometric device. For mobile devices supporting NFC, you can tap a YubiKey NEO to the phone.

3 Customers Deployed by 8 of the top 10 internet companies Bestseller on Amazon.com Tord Our business model is simple: We offer our YubiKeys online, with free open source servers. We allow anyone to integrate with their own software, services, or enterprise IT-systems. Today we have shipped millions of Yubikeys to more than 150 countries. And 8 of the top 10 Internet companies use Yubikey internally, and have - or are in the process of - making support for their end-users. A product delivered by

4 Where Can I Use the YubiKey?
OTP PIV OpenPGP FIDO U2F Tord The YubiKey can be easily integrated with your own software, service or enterprise IT-system. Or you can use it out-of-the-box, with a growing number of applications. The same YubiKey that I have on my keychain I use with my LastPass account, my corporate Salesforce account. And using one time password, I can use it as a PIV smart card to access my Windows environment. And I can use the same key to also log in to Google for Work, GitHub, and Dropbox with no third-party service or software installed. It just works out of the box. All three protocols are supported across all these apps with a simple touch on a single device. Next slide please. I’m now going to pass the presentation over to Tom, who will talk a bit more about all of these different protocols and use cases. Tom?

5 YubiKey 4 OpenPGP PIV Config Set 1 Config Set 2 OATH-TOTP FIDO U2F
Yubico OTP OATH-HOTP Challenge-Response Static Credential Config Set 2 Yubico OTP OATH-HOTP Challenge-Response Static Credential Tom YubiKeys support multiple modes - each YubiKey combines the function of many other devices. Points: One device, multiple functions all working together at the same time. OATH-TOTP FIDO U2F

6 Passwords anyone? Reused Phished and MitM Keylogged

7 Didn’t we solve this already?
Smart Cards SMS OTP devices Readers/drivers Middleware Cost Coverage Delay Cost Battery Battery Shared secrets One per site Provisioning costs OTP is short for One-Time Password Shared secrets are hard to protect and scale, and cannot be hashed.

8 ...but most importantly User experience Still phishable MITM
Users find it hard to use Successful attacks carried out today Successful attacks carried out today None of these technologies has any protection against phishing. If you can phish a password, you can phish a one-time password… Over 90 percent of hacking attacks begin with phishing.

9 ...but most importantly User experience Still phishable MITM
Users find it hard to use Successful attacks carried out today Successful attacks carried out today

10 ...also No batteries or drivers One device Open standard
Site-specific keys Standardized in the FIDO Alliance FIDO Alliance: 200 member companies. Led by Google, Microsoft, Yubico and others.

11 U2F at Google Compared to TOTP
Google started rolling out U2F two years ago internally. Now almost all internal applications supports U2F.

12 Support incidents 40% fewer

13 Login times 400% quicker

14 Security incidents “Dramatic decrease, no more Phishing”

15 Resources Strengthen 2 step verification with Security Key
Yubico Security Key Yubico Libraries, Plugins, Sample Code, Documentation FIDO U2F Protocol Specification Yubico Demo Server - Test U2F Yubico Demo Server - Test Yubico OTP Google security blog yubico.com/security-key developers.yubico.com fidoalliance.org/specifications demo.yubico.com/u2f demo.yubico.com

16 By your Yubikey Online on www.ciptor-Benelux.com
::: Danny Zeegers::: ::: PUB ::: A FF8A F719 AE B89 4D83 1CE A VP Sales BENELUX Cell: Skype: Danny Zeegers By your Yubikey Online on


Download ppt "2 Factor & Multi Factor Authentication"

Similar presentations


Ads by Google