Knowledge

Strong authentication

Source đź“ť

120: 182: 24: 65: 275:), but strong authentication is not necessarily multi-factor authentication. Soliciting multiple answers to challenge questions may be considered strong authentication but, unless the process also retrieves "something you have" or "something you are", it would not be considered multi-factor authentication. The 279:
issued supplemental guidance on this subject in August 2006, in which they clarified, "By definition true multifactor authentication requires the use of solutions from two or more of the three categories of factors. Using multiple solutions from the same category ... would not constitute multifactor
296:
protocol. This type of definition is found in the Handbook of applied cryptography. This type of definition does not necessarily relate to two-factor authentication, since the
303:
An other class of definitions says that strong authentication is any form of authentication in which the verification is accomplished without the transmission of a
276: 83: 130: 329:
has been striving to establish technical specifications for strong authentication and has 250 members and over 150 certified products.
384: 37: 138: 369: 243: 225: 163: 101: 51: 406:"Frequently Asked Questions on FFIEC Guidance on Authentication in an Internet Banking Environment, August 15, 2006" 207: 493: 498: 319: 192: 272: 300:
used in a challenge–response authentication scheme can be simply derived from a password (one factor).
43: 465: 354: 268: 379: 374: 203: 134: 315: 293: 199: 79: 8: 145: 405: 487: 364: 326: 289: 403: 429: 451: 349: 297: 210:. Statements consisting only of original research should be removed. 308: 304: 307:. This is the case for example with the definition found in the 262: 466:"FIDO Alliance Passes 150 Post-Password Certified Products" 359: 292:
process, or more precisely, authentication based on a
314:
An other class, which has legal standing within the
288:A commonly found class of definitions relates to a 74:
may be too technical for most readers to understand
404:Board of Governors of the Federal Reserve System. 485: 267:Strong authentication is often confused with 52:Learn how and when to remove these messages 263:Difference with two-factor authentication 244:Learn how and when to remove this message 226:Learn how and when to remove this message 164:Learn how and when to remove this message 102:Learn how and when to remove this message 86:, without removing the technical details. 144:Relevant discussion may be found on the 486: 385:Identity threat detection and response 259:is a notion with several definitions. 468:. InfoSecurity Magazine. 5 April 2016 84:make it understandable to non-experts 327:Fast IDentity Online (FIDO) Alliance 175: 113: 58: 17: 13: 430:"Handbook of Applied Cryptography" 370:Initiative for Open Authentication 340:is defined in the context of use. 336:can be used as long as the notion 14: 510: 33:This article has multiple issues. 180: 118: 63: 22: 41:or discuss these issues on the 458: 444: 422: 397: 320:Strong Customer Authentication 283: 1: 390: 7: 343: 273:multi-factor authentication 206:the claims made and adding 10: 515: 355:Electronic authentication 271:(more generally known as 269:two-factor authentication 432:. Cacr.math.uwaterloo.ca 127:This article or section 494:Computer access control 380:Self-sovereign identity 375:Reliance authentication 499:Authentication methods 452:"Fermilab | Home" 316:European Economic Area 334:strong authentication 257:Strong authentication 131:synthesis of material 294:challenge–response 191:possibly contains 141:to the main topic. 135:verifiably mention 129:possibly contains 280:authentication." 254: 253: 246: 236: 235: 228: 193:original research 174: 173: 166: 112: 111: 104: 56: 506: 478: 477: 475: 473: 462: 456: 455: 448: 442: 441: 439: 437: 426: 420: 419: 417: 415: 410: 401: 249: 242: 231: 224: 220: 217: 211: 208:inline citations 184: 183: 176: 169: 162: 158: 155: 149: 122: 121: 114: 107: 100: 96: 93: 87: 67: 66: 59: 48: 26: 25: 18: 514: 513: 509: 508: 507: 505: 504: 503: 484: 483: 482: 481: 471: 469: 464: 463: 459: 450: 449: 445: 435: 433: 428: 427: 423: 413: 411: 408: 402: 398: 393: 346: 332:Thus, the term 311:documentation. 286: 265: 250: 239: 238: 237: 232: 221: 215: 212: 197: 185: 181: 170: 159: 153: 150: 143: 133:which does not 123: 119: 108: 97: 91: 88: 80:help improve it 77: 68: 64: 27: 23: 12: 11: 5: 512: 502: 501: 496: 480: 479: 457: 443: 421: 395: 394: 392: 389: 388: 387: 382: 377: 372: 367: 362: 357: 352: 345: 342: 285: 282: 264: 261: 252: 251: 234: 233: 188: 186: 179: 172: 171: 126: 124: 117: 110: 109: 71: 69: 62: 57: 31: 30: 28: 21: 9: 6: 4: 3: 2: 511: 500: 497: 495: 492: 491: 489: 467: 461: 453: 447: 431: 425: 407: 400: 396: 386: 383: 381: 378: 376: 373: 371: 368: 366: 365:FIDO Alliance 363: 361: 358: 356: 353: 351: 348: 347: 341: 339: 335: 330: 328: 323: 321: 317: 312: 310: 306: 301: 299: 295: 291: 290:cryptographic 281: 278: 274: 270: 260: 258: 248: 245: 230: 227: 219: 209: 205: 201: 195: 194: 189:This article 187: 178: 177: 168: 165: 157: 147: 142: 140: 136: 132: 125: 116: 115: 106: 103: 95: 85: 81: 75: 72:This article 70: 61: 60: 55: 53: 46: 45: 40: 39: 34: 29: 20: 19: 16: 470:. Retrieved 460: 446: 434:. Retrieved 424: 412:. Retrieved 399: 337: 333: 331: 324: 313: 302: 287: 266: 256: 255: 240: 222: 213: 190: 160: 151: 128: 98: 89: 73: 49: 42: 36: 35:Please help 32: 15: 284:Definitions 92:August 2017 488:Categories 391:References 350:3-D Secure 298:secret key 216:April 2019 200:improve it 154:April 2019 38:improve it 204:verifying 146:talk page 44:talk page 344:See also 309:Fermilab 305:password 472:13 June 436:17 July 198:Please 78:Please 414:22 May 338:strong 139:relate 409:(PDF) 318:, is 277:FFIEC 474:2016 438:2014 416:2012 325:The 360:EMV 202:by 137:or 82:to 490:: 322:. 47:. 476:. 454:. 440:. 418:. 247:) 241:( 229:) 223:( 218:) 214:( 196:. 167:) 161:( 156:) 152:( 148:. 105:) 99:( 94:) 90:( 76:. 54:) 50:(

Index

improve it
talk page
Learn how and when to remove these messages
help improve it
make it understandable to non-experts
Learn how and when to remove this message
synthesis of material
verifiably mention
relate
talk page
Learn how and when to remove this message
original research
improve it
verifying
inline citations
Learn how and when to remove this message
Learn how and when to remove this message
two-factor authentication
multi-factor authentication
FFIEC
cryptographic
challenge–response
secret key
password
Fermilab
European Economic Area
Strong Customer Authentication
Fast IDentity Online (FIDO) Alliance
3-D Secure
Electronic authentication

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑