Definition Edit

Existing authentication methodologies involve three basic “factors”:

Two-factor authentication (T-FA) requires that a user present two of the three possible factors to the authentication mechanism.

Overview Edit

A known flaw in some T-FA systems is the server storage of a hash representation of the credentials contained on the smart card or token. With this in hand, the attacker can replay that data to the authentication system; in this case, that of the proxy server, without needing the smart card or token.

Two-factor authentication is still susceptible to man-in-the-middle attacks.

See also Edit

External resource Edit

Ad blocker interference detected!

Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.