• To improve the security, it is proposed to use Two-factor Authentication (2FA).
  • 1. Something that the user knows  user password.
  • First possibility: Google Authenticator (1)
  • First possibility: Google Authenticator (2)
  • Other possibilities (2)
  • Two-factor authentication (2FA) deta




    Download 4.97 Mb.
    Sana24.11.2023
    Hajmi4.97 Mb.
    #104447
    Bog'liq
    DETA-37-06e
    ApplicationFile, 8-sinf algebra test, referatbank-32313, 3-Amaliy mashgulot, 6-Mustaqil ish topshiriqlari, Документ Microsoft Word, TEST6, TEST8., 1-MAVZU. “DAVLAT BYUDJETI” FANIGA KIRISH, Pokiza tadbir bayyonomasi, Язык программирования PYTHON, Философия узб, Xoshimuratov Habibulla Seminar, topografiya, adabiyotlar r

    Two-factor authentication (2FA)

    DETA | March 2020

    Introduction

    The login into DETA is done with a user & password.

    • For some authorities, the access in the DETA system with User & Password is not secure enough.
    • It is needed a stronger authentication method to access to the documents in the DETA.
    • It is important that unauthorized users gain access. For example, the test reports that may contain sensitive information.
    • To improve the security, it is proposed to use Two-factor Authentication (2FA).

    • With this authentication, the user will have to deal with two actions to gain access into the DETA system.

    What is Two-factor authentication?

    Two-factor authentication (also known as 2FA):

    • It is a type of Multi-factor authentication (MFA).
    • It is a method of confirming users identities by using a combination of two different factors.
    • So it requires the user have two things to get into his/her account
    • 1. Something that the user knows  user & password.

      2. Something that the user has/is  one-time password, USB stick, fingerprint…

    Why should it be used in DETA?

    Two-factor authentication is needed in DETA due to:

    • RDW is requesting this secure method.
    • DETA systems contains sensible data.
    • User & password is not secure enough nowadays.
    • Unauthorized person can gain access to the documents easily by stealing the credentials.
    • To increase the security of DETA system and reduce the risk that an unauthorized third-party accesses it.

    First possibility: Google Authenticator (1)

    Google Authenticator is a free app for smartphones that generates a new code every 30 seconds.

    How does it work?

    • Add an account at Google Authenticator app using one of the following options:
    • a) Scan a barcode

      b) Enter a provided key

    • a) or b) will be provided by DETA system/administrator. It is a one time action.
    • Then Google Authenticator app this ready to generate a new code every 30 seconds.
    • Once the user introduces the right user & password, the system will ask for the 6 digit code from Google authenticator.
    • The user has to introduce the code that it is given by the app.
    • If the code is correct, the user can access the system.

    First possibility: Google Authenticator (2)

    Use case:


    Introduce the user & password
    Get the code in Google Authenticator
    Introduce the code
    Login
    One factor
    Two factor

    Other possibilities (1)

    Hardware tokens:

    • It uses a real physical key.
    • After the login with user & password, you will need to connect the token
    • to the device from which you are logging.

    • Some devices require a PIN or fingerprint scan additionally.
    • One popular hardware token is the YubiKey, a small USB.
    • TAN: transaction authentication number

    • It is used by some online banking services as a form of single use one-time passwords (OTPs).
    • TANs are a second layer of security above and beyond the traditional single-password authentication.
    • If the physical document or token containing the TANs is stolen, it will be useless without the password.

    Other possibilities (2)

    SMS-based:

    • The service sends to the user phone number a text message containing a one-time code whenever the user signs in.
    • So if someone has your username and password for that account, they won’t be able to sign into your account without access to your text messages.
    • SMS-based two-factor authentication isn’t considered ideal because someone could steal the phone number or intercept your text messages. 

    Download 4.97 Mb.




    Download 4.97 Mb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Two-factor authentication (2FA) deta

    Download 4.97 Mb.