Maybe you’ve heard the term 2FA (or two-factor authentication) or MFA (multi-factor authentication) but weren’t sure what was involved with it. Or perhaps, you are already familiar with implementing 2FA but want to know more about the best practices. Either way, this video from Kelley Robinson is just for you!

Sign up for a free Twilio API key: https://www.twilio.com/try-twilio?utm_source=morioh.com

Check out the Related Links section of this description for more information on 2FA.

Authentication needs to be usable for it to be successful. Unfortunately, passwords are pretty insecure. Not only do some users choose guessable passwords but they tend to use them all over the internet as well. 2FA adds an extra layer of security by requiring at least two types of authentication. Like all security, authentication is all about finding the right balance between usability and friction. In this video Kelley walks through the why’s and how’s behind 2FA, some data around implementation stats, and the different options for adding 2FA to your applications.

Thanks for watching!

=== TIMESTAMPS ===

  • 0:00 What is 2FA?
  • 0:59 Passwords are insecure!
  • 1:29 Password re-use leads to account takeovers
  • 2:01 Other types of authentication factors
  • 2:34 Examples of 2FA
  • 3:09 Methods for adding 2FA to your applications
  • 3:33 SMS 2FA
  • 4:03 Email 2FA
  • 4:18 Time-based one-time passcodes (TOTP)
  • 4:49 Push authentication
  • 5:30 Users must opt-in for 2FA to be effective
  • 7:04 Tips for implementing 2FA
  • 7:41 Incentivizing users to opt-in

#security #developer

What is 2FA?
1.60 GEEK