Single-use codes delivered by email and SMS, mobile phone verification using automated phone calls and installed applications, or standalone physical devices – there’s more than one way to do 2nd-factor authentication (2FA).

There are benefits – and downsides – to each. Learn how each one works and what is best for you and your users. Avoid some common mistakes when rolling out 2FA, and take a look at how you can add one, or many, to your application’s login flow.

Comments

Comments are closed.

Joe Ferguson at 08:02 on 16 Dec 2016

Great talk giving really well detailed examples and explanations of different methods of doing second factor authentication.