Advantages of Integrated Two-Factor Authentication

Advantages of Integrated
Two-Factor Authentication
T
wo-factor authentication (2FA) has been around for
a result, the number of 2FA accounts the average user
to get access to the corporate VPN, perhaps for
of the number of usernames and passwords, we are
quite a while. Until recently, 2FA was usually used
a few high-security applications, and by CFOs and a few
high-worth individuals to manage their bank accounts. 2FA
also usually involved some sort of token: either a dedicated
piece of hardware that displayed a number or a soft-token
application that ran on your computer, or more recently on
must manage is increasing. While not nearly at the scale
rapidly approaching the point where the number of 2FA
technologies becomes difficult to manage. Which token (or
soft token) do I use for this account? What’s the right app to
use for this? Will it send me an SMS, phone me, or what?
Enterprises deploying two-factor authentication have an
your phone.
advantage: they are in a position to require employees to
factor authentication much more into the mainstream
cases, financial institutions can require 2FA, particularly
The threat landscape is changing, bringing two-
use 2FA to get access to corporate applications. In some
for consumers. Driven by Federal banking regulations,
financial institutions are deploying 2FA and out-of-band
authentication for many average consumers’ online
transactions. And given a sharp increase in attacks, 2FA
is even finding use in the realm of social media logins. As
PA GE 1
Contact OneID
where it is uniformly required by others in the industry. But
in other situations, uptake of 2FA is in the single digits. How
can we make 2FA easy enough to use to actually move the
needle on security on these sites?
[email protected]
www.oneid.com
authentication methods that don’t reveal which
Adding Two-Factor
Authentication
authentication factor failed or succeeded are inherently
stronger than those that give this clue. In some cases,
users may be prompted for authentications on their mobile
Sites that want to use two-factor authentication often
have some existing authentication mechanism in place,
probably username and password. They need to make
phones that they didn’t initiate. While this is potentially
annoying, it is also an alarm to warn them of a possible
attack.
Two-factor authentication can use several different
two-factor authentication available in a way that is least
methods. By far the most secure is to use a smartphone
deployment of two-factor authentication as an add-on. After
the authentication service and displays the nature of the
disruptive to their existing user base. This leads to the
the user provides their username and password, they are
required to prove the possession of something they have,
sometimes referred to as a token. In this context, a token
doesn’t have to be a specific authentication device; it could
also be something like their mobile phone.
When a user first uses a two-factor authentication token,
they must first associate that device with their account.
Depending on the situation, this may be as simple as
allowing the user to associate the device after logging in,
or may require that the user provide additional proof (such
as a one-time password mailed to them) to make sure that
application that communicates securely (using SSL) with
transaction being approved. It may also prompt the user
for additional confirmation (such as entry of a PIN) and
may provide a cryptographic signature from the user to
document that approval.
What is Integrated TwoFactor Authentication?
Combining, or integrating, the authentication factors
an impostor isn’t doing this on a legitimate user’s behalf.
increases security, improves the user experience, and
to the online service that is used when the online service
authentication methods. Improved user experience is
The two-factor authentication service provides an identifier
wants to request stronger authentication of the user.
Depending on the type of authentication service and
type of token the user has, different things may be provided
provides flexibility that is not available when using separate
critical to gaining acceptance for two-factor authentication
when its use is not mandated.
As mentioned above, having two separate authentication
to the authentication service. A very basic 2FA service
factors makes it possible for an attacker to go after the
the user enters on the online service, which sends it to the
better than single-factor authentication, it isn’t as strong as
may just send a numeric code to the user’s phone, which
authentication provider for verification. An improvement
on this is to include a description of the transaction, which
would be displayed to the user for additional assurance of
what they’re approving. Yet more advanced 2FA services,
such as OneID, include a digital signature from the user on
the transaction description. This provides non-repudiation,
a positive confirmation that the user did sign the transaction
and can’t repudiate or deny that he/she did so.
For maximum security, an attacker must not have the
ability to independently attack the two authentication
factors. Just like it’s good practice not to tell the attacker if
it was the username or password that failed authentication,
PA GE 2
Contact OneID
two factors individually. While the resulting security is
it could be. One of the characteristics of integrated two-
factor authentication is that the two factors are evaluated
at the same time. A good example is OneID out-of-band
authentication. When a PIN (something you know) is
requested from the user, it is combined (or “salted”) with
keying information on the device to create a verifier that
is verified by the OneID Repository. The PIN never leaves
the device, and the salt value used for comparison is never
available to the repository. The repository also enforces
a limit on the rate of PIN verifications that it will permit.
The result is that verification of the PIN verification is
much stronger than with approaches that verify PINs and
[email protected]
www.oneid.com
passwords locally, and a verification failure doesn’t indicate
if the PIN or keying information were incorrect.
While the OneID out-of-band verification can itself
be an integrated two-factor system, it integrates cleanly
become yet more challenging, to provide advanced
alternatives to username/password, and to improve the
security of the authentication methods already in place.
Two-factor authentication is often being used to
with existing single-factor authentication schemes widely
work around the fundamental weaknesses in password
authentication to sites with existing username/password
security, it increases user friction, a particular problem
in use. This brings the benefit of integrated two-factor
infrastructure.
As users acquire a variety of different devices that they
may use as two-factor authentication tokens, it becomes
increasingly important to manage the devices to make it
easy for the user to revoke lost or stolen devices. Users
may also have several out-of-band devices available for
use, such as a phone and a tablet computer. In order
that it not be necessary to enroll each device with each
of the online services that the user accesses, OneID
management. While two-factor authentication does improve
for online services that are not in a position to mandate
2FA. Integrated 2FA provides the best usability for better
security, so a two-factor authentication technology that
can be upgraded to integrate the two factors more closely
has the best ability to grow as needs change as well as to
maximize user uptake of optional 2FA.
Look to tomorrow’s authentication requirements, not
today’s, when upgrading your authentication.
integrated two-factor authentication also presents common
authentication credentials to online services, independent
of which device is used for a given transaction.
Additional capabilities are available when OneID
authentication is used as the first authentication factor as
well. OneID allows users to require stronger authentication
from devices they have less direct control over, such as
a computer at home that their kids also use. The OneID
control panel allows users to specify these requirements;
the actual strength of authentication performed is the
greater of that required by the online service and by user
preferences.
Conclusion
Maintaining security is becoming more and more
challenging with time. Some of the challenges can be
anticipated, such as advances in computation that are
making it progressively easier to dictionary-attack a
password database. Other challenges are harder to
anticipate, such as the discovery of new “day-zero”
vulnerabilities in operating software. For these reasons,
security requirements are not fixed, but increase with time.
Online services considering deploying a two-factor
authentication service should consider the ability of that
service to grow with them: the ability to evolve as threats
PA GE 3
Contact OneID
[email protected]
www.oneid.com