SlideShare a Scribd company logo
1 of 60
Download to read offline
security
keys
Paul Schreiberpaulschreiber@gmail.com
@paulschreiber
know
are
have
NIST Special
Publication
800-63BDigital Identity Guidelines
Authentication and Lifecycle Management
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
yubico.com/gafw/
50%
off
os in-browser u2f support
macOS iOS Linux Android Windows
USB ✔ ✘ ✔ ✘ ✔
Bluetooth ✘ ✔ ✘ ✔ ✘
NFC ✘ ✘ ✘ ✔ ✘
github.com/

Safari-FIDO-U2F/
Safari-FIDO-U2F
WebAuthn 
dongleauth.info
wordpress.org/
plugins/
two-factor/
wordpress.org/
plugins/
google-apps-
login/
SSH
Many graphics from The Noun Project

Computer by Azis; Credit card Gonzalo Bravo; Email by Bryn Taylor; Fingerprint by
Ben Davis; Lock with keyhole by Brennan Novak; Nokia 3310 by Stan Fisher;
Shield by Wayne Thayer; Star by Thays Malcher; Warning by Icomatic.

More Related Content

What's hot

Honeywell gsmvlp5-honeywell-ilp5-install-guide
Honeywell gsmvlp5-honeywell-ilp5-install-guideHoneywell gsmvlp5-honeywell-ilp5-install-guide
Honeywell gsmvlp5-honeywell-ilp5-install-guideAlarm Grid
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
American Fibertek RR-980C User Manual
American Fibertek RR-980C User ManualAmerican Fibertek RR-980C User Manual
American Fibertek RR-980C User ManualJMAC Supply
 
Brochure Simsa Eng
Brochure Simsa EngBrochure Simsa Eng
Brochure Simsa EngMyti S.r.l.
 
IT Lunch and Learn Final
IT Lunch and Learn FinalIT Lunch and Learn Final
IT Lunch and Learn FinalBen Wright
 
Paxton Access 460-210-US Instruction Manual
Paxton Access 460-210-US Instruction ManualPaxton Access 460-210-US Instruction Manual
Paxton Access 460-210-US Instruction ManualJMAC Supply
 
Viking K 1900-3 - Door Entry Dialer 250 apt
Viking K 1900-3 - Door Entry Dialer 250 aptViking K 1900-3 - Door Entry Dialer 250 apt
Viking K 1900-3 - Door Entry Dialer 250 aptlcdtcorp
 
Tl wr743 nd-v2_user_guide
Tl wr743 nd-v2_user_guideTl wr743 nd-v2_user_guide
Tl wr743 nd-v2_user_guidecristian975
 
Edwards Signaling B-KHD-1000-PP Installation Manual
Edwards Signaling B-KHD-1000-PP Installation ManualEdwards Signaling B-KHD-1000-PP Installation Manual
Edwards Signaling B-KHD-1000-PP Installation ManualJMAC Supply
 
Matrix Telecom Solutions: SIMADO GFXD1111S - FCT
Matrix Telecom Solutions: SIMADO GFXD1111S - FCTMatrix Telecom Solutions: SIMADO GFXD1111S - FCT
Matrix Telecom Solutions: SIMADO GFXD1111S - FCTMatrix Comsec
 
[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system운상 조
 
American Fibertek MX4-1000TX User Manual
American Fibertek MX4-1000TX User ManualAmerican Fibertek MX4-1000TX User Manual
American Fibertek MX4-1000TX User ManualJMAC Supply
 

What's hot (17)

Honeywell gsmvlp5-honeywell-ilp5-install-guide
Honeywell gsmvlp5-honeywell-ilp5-install-guideHoneywell gsmvlp5-honeywell-ilp5-install-guide
Honeywell gsmvlp5-honeywell-ilp5-install-guide
 
H ap qg
H ap qgH ap qg
H ap qg
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
American Fibertek RR-980C User Manual
American Fibertek RR-980C User ManualAmerican Fibertek RR-980C User Manual
American Fibertek RR-980C User Manual
 
JasonDD214Short2.PDF
JasonDD214Short2.PDFJasonDD214Short2.PDF
JasonDD214Short2.PDF
 
Brochure Simsa Eng
Brochure Simsa EngBrochure Simsa Eng
Brochure Simsa Eng
 
IT Lunch and Learn Final
IT Lunch and Learn FinalIT Lunch and Learn Final
IT Lunch and Learn Final
 
FCC License
FCC LicenseFCC License
FCC License
 
Paxton Access 460-210-US Instruction Manual
Paxton Access 460-210-US Instruction ManualPaxton Access 460-210-US Instruction Manual
Paxton Access 460-210-US Instruction Manual
 
Viking K 1900-3 - Door Entry Dialer 250 apt
Viking K 1900-3 - Door Entry Dialer 250 aptViking K 1900-3 - Door Entry Dialer 250 apt
Viking K 1900-3 - Door Entry Dialer 250 apt
 
Tl wr743 nd-v2_user_guide
Tl wr743 nd-v2_user_guideTl wr743 nd-v2_user_guide
Tl wr743 nd-v2_user_guide
 
Tl wa701 nd user guide
Tl wa701 nd user guideTl wa701 nd user guide
Tl wa701 nd user guide
 
Edwards Signaling B-KHD-1000-PP Installation Manual
Edwards Signaling B-KHD-1000-PP Installation ManualEdwards Signaling B-KHD-1000-PP Installation Manual
Edwards Signaling B-KHD-1000-PP Installation Manual
 
Matrix Telecom Solutions: SIMADO GFXD1111S - FCT
Matrix Telecom Solutions: SIMADO GFXD1111S - FCTMatrix Telecom Solutions: SIMADO GFXD1111S - FCT
Matrix Telecom Solutions: SIMADO GFXD1111S - FCT
 
20109149225111
2010914922511120109149225111
20109149225111
 
[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system
 
American Fibertek MX4-1000TX User Manual
American Fibertek MX4-1000TX User ManualAmerican Fibertek MX4-1000TX User Manual
American Fibertek MX4-1000TX User Manual
 

More from Paul Schreiber

Brooklyn Soloists: personal digital security
Brooklyn Soloists: personal digital securityBrooklyn Soloists: personal digital security
Brooklyn Soloists: personal digital securityPaul Schreiber
 
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folksCreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folksPaul Schreiber
 
WordCamp for Publishers: Security for Newsrooms
WordCamp for Publishers: Security for NewsroomsWordCamp for Publishers: Security for Newsrooms
WordCamp for Publishers: Security for NewsroomsPaul Schreiber
 
VIP Workshop: Effective Habits of Development Teams
VIP Workshop: Effective Habits of Development TeamsVIP Workshop: Effective Habits of Development Teams
VIP Workshop: Effective Habits of Development TeamsPaul Schreiber
 
WordPress NYC: Information Security
WordPress NYC: Information SecurityWordPress NYC: Information Security
WordPress NYC: Information SecurityPaul Schreiber
 
WPNYC: Moving your site to HTTPS
WPNYC: Moving your site to HTTPSWPNYC: Moving your site to HTTPS
WPNYC: Moving your site to HTTPSPaul Schreiber
 
NICAR delivering the news over HTTPS
NICAR delivering the news over HTTPSNICAR delivering the news over HTTPS
NICAR delivering the news over HTTPSPaul Schreiber
 
WordCamp US: Delivering the news over HTTPS
WordCamp US: Delivering the news over HTTPSWordCamp US: Delivering the news over HTTPS
WordCamp US: Delivering the news over HTTPSPaul Schreiber
 
BigWP: Delivering the news over HTTPS
BigWP: Delivering the news over HTTPSBigWP: Delivering the news over HTTPS
BigWP: Delivering the news over HTTPSPaul Schreiber
 
Delivering the news over HTTPS
Delivering the news over HTTPSDelivering the news over HTTPS
Delivering the news over HTTPSPaul Schreiber
 
Web Scraping with Python
Web Scraping with PythonWeb Scraping with Python
Web Scraping with PythonPaul Schreiber
 
D'oh! Avoid annoyances with Grunt.
D'oh! Avoid annoyances with Grunt.D'oh! Avoid annoyances with Grunt.
D'oh! Avoid annoyances with Grunt.Paul Schreiber
 
Getting to Consistency
Getting to ConsistencyGetting to Consistency
Getting to ConsistencyPaul Schreiber
 
EqualityCamp: Lessons learned from the Obama Campaign
EqualityCamp: Lessons learned from the Obama CampaignEqualityCamp: Lessons learned from the Obama Campaign
EqualityCamp: Lessons learned from the Obama CampaignPaul Schreiber
 

More from Paul Schreiber (18)

Brooklyn Soloists: personal digital security
Brooklyn Soloists: personal digital securityBrooklyn Soloists: personal digital security
Brooklyn Soloists: personal digital security
 
BigWP live blogs
BigWP live blogsBigWP live blogs
BigWP live blogs
 
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folksCreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
 
WordCamp for Publishers: Security for Newsrooms
WordCamp for Publishers: Security for NewsroomsWordCamp for Publishers: Security for Newsrooms
WordCamp for Publishers: Security for Newsrooms
 
VIP Workshop: Effective Habits of Development Teams
VIP Workshop: Effective Habits of Development TeamsVIP Workshop: Effective Habits of Development Teams
VIP Workshop: Effective Habits of Development Teams
 
WordPress NYC: Information Security
WordPress NYC: Information SecurityWordPress NYC: Information Security
WordPress NYC: Information Security
 
WPNYC: Moving your site to HTTPS
WPNYC: Moving your site to HTTPSWPNYC: Moving your site to HTTPS
WPNYC: Moving your site to HTTPS
 
NICAR delivering the news over HTTPS
NICAR delivering the news over HTTPSNICAR delivering the news over HTTPS
NICAR delivering the news over HTTPS
 
WordCamp US: Delivering the news over HTTPS
WordCamp US: Delivering the news over HTTPSWordCamp US: Delivering the news over HTTPS
WordCamp US: Delivering the news over HTTPS
 
BigWP: Delivering the news over HTTPS
BigWP: Delivering the news over HTTPSBigWP: Delivering the news over HTTPS
BigWP: Delivering the news over HTTPS
 
Delivering the news over HTTPS
Delivering the news over HTTPSDelivering the news over HTTPS
Delivering the news over HTTPS
 
Web Scraping with Python
Web Scraping with PythonWeb Scraping with Python
Web Scraping with Python
 
D'oh! Avoid annoyances with Grunt.
D'oh! Avoid annoyances with Grunt.D'oh! Avoid annoyances with Grunt.
D'oh! Avoid annoyances with Grunt.
 
Getting to Consistency
Getting to ConsistencyGetting to Consistency
Getting to Consistency
 
Junk Mail
Junk MailJunk Mail
Junk Mail
 
EqualityCamp: Lessons learned from the Obama Campaign
EqualityCamp: Lessons learned from the Obama CampaignEqualityCamp: Lessons learned from the Obama Campaign
EqualityCamp: Lessons learned from the Obama Campaign
 
Mac Productivity 101
Mac Productivity 101Mac Productivity 101
Mac Productivity 101
 
How NOT to rent a car
How NOT to rent a carHow NOT to rent a car
How NOT to rent a car
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

BigWP Security Keys

  • 3.
  • 4.
  • 5.
  • 7. are
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. NIST Special Publication 800-63BDigital Identity Guidelines Authentication and Lifecycle Management
  • 24. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 25. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 26. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 27. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 35.
  • 36. os in-browser u2f support macOS iOS Linux Android Windows USB ✔ ✘ ✔ ✘ ✔ Bluetooth ✘ ✔ ✘ ✔ ✘ NFC ✘ ✘ ✘ ✔ ✘
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 52.
  • 53.
  • 56.
  • 57.
  • 58. SSH
  • 59.
  • 60. Many graphics from The Noun Project Computer by Azis; Credit card Gonzalo Bravo; Email by Bryn Taylor; Fingerprint by Ben Davis; Lock with keyhole by Brennan Novak; Nokia 3310 by Stan Fisher; Shield by Wayne Thayer; Star by Thays Malcher; Warning by Icomatic.