By Stephen Downes - Stephen's Web. How to Deploy Two-Factor Authentication
Joel Snyder, EdTech Magazine, March 8, 2013
We're reading more recently about something called 'two factor authentication'. Here's the concept: "This technique combines a password with something else the user has, such as a token, smart card or a biometric identifier." The 'gold standard' of two factor authentication is the token - a card, signet ring, or some other item that can't be easily duplicated. More...
27 février 2019
How to Deploy Two-Factor Authentication
Commentaires