Tag

MFA

0 views collected around this technical thread.

Architecture and Beyond
Architecture and Beyond
Dec 7, 2024 · Information Security

Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations

This article explains the concepts, importance, various forms, and practical implementation details of MFA and 2FA—including the Google Authenticator TOTP mechanism—while also discussing their limitations, costs, and future directions in modern identity security.

2FAAuthenticationGoogle Authenticator
0 likes · 15 min read
Understanding Multi-Factor Authentication (MFA) and Google Authenticator: Principles, Implementation, and Limitations
Architecture Development Notes
Architecture Development Notes
Jan 1, 2024 · Information Security

How to Build a Secure User Authentication Architecture: Key Principles and Protocols

This article explains the essential components of user authentication architecture, covering its importance, core principles, registration, login, session management, popular protocols like OAuth, OpenID Connect, SAML, JWT, and critical security considerations for robust protection.

AuthenticationMFAOAuth
0 likes · 8 min read
How to Build a Secure User Authentication Architecture: Key Principles and Protocols
IT Services Circle
IT Services Circle
Oct 12, 2022 · Information Security

Rethinking Password Complexity: Favor Length, Managers, and Multi‑Factor Authentication

The article argues that traditional password complexity rules and periodic resets are outdated, advocating for longer passwords, the use of password managers and multi‑factor authentication, and limiting login attempts to improve security in modern, always‑connected systems.

AuthenticationMFANIST
0 likes · 5 min read
Rethinking Password Complexity: Favor Length, Managers, and Multi‑Factor Authentication
Aikesheng Open Source Community
Aikesheng Open Source Community
Mar 15, 2022 · Databases

Using MySQL 8.0.27 Multi‑Factor Authentication with the authentication_policy Variable

This article explains how MySQL 8.0.27 adds multi‑factor authentication (MFA) via the new authentication_policy system variable, demonstrates configuring the variable, creating users with single or multiple authentication plugins, installing external plugins, and verifies MFA behavior with practical Docker‑based examples.

MFAMySQLauthentication_policy
0 likes · 10 min read
Using MySQL 8.0.27 Multi‑Factor Authentication with the authentication_policy Variable
DevOps Cloud Academy
DevOps Cloud Academy
Jun 14, 2021 · Information Security

7 Best Practices for Microservice Security

This article explains how microservice architecture introduces new security challenges and presents seven best‑practice recommendations—including using an API gateway, strong defense layers, DevSecOps, trusted encryption libraries, service‑level security, multi‑factor authentication, and dependency verification—to help protect microservice‑based applications.

API GatewayDevSecOpsMFA
0 likes · 6 min read
7 Best Practices for Microservice Security
DevOps Cloud Academy
DevOps Cloud Academy
Apr 5, 2021 · Information Security

7 Best Practices for Microservice Security

Microservice architectures increase deployment flexibility but also expand the attack surface, so this article outlines seven essential security best practices—including using an API gateway, layered defenses, DevSecOps, trusted encryption libraries, service-level protection, multi-factor authentication, and dependency vulnerability scanning—to safeguard microservice-based applications.

API GatewayDevSecOpsMFA
0 likes · 6 min read
7 Best Practices for Microservice Security
Architects Research Society
Architects Research Society
Sep 21, 2019 · Information Security

12 Best Cybersecurity Practices for 2019

This article outlines twelve essential cybersecurity practices for 2019, covering biometric authentication, tiered security policies, risk‑based approaches, regular backups, IoT security, multi‑factor authentication, password management, least‑privilege principles, privileged‑user monitoring, third‑party access control, phishing awareness, and employee training.

IoT securityMFARisk Assessment
0 likes · 18 min read
12 Best Cybersecurity Practices for 2019