Create a hack-proof web page
Create a hack-proof web page Making your own website hack-proof
Time-based one-time passwords (TOTP for short) add another component to log-in via user name and password and secure sensitive company data via two-factor authentication (2FA). But how do time-based one-time passwords actually work and what advantages does a hardware authenticator offer?
Whether it’s business applications such as Microsoft 365, PC support via Teamviewer, or remote VPN access to a company’s own network, simply entering a user name and password is no longer enough. Almost all online platforms therefore offer the option of protecting user accounts against misuse and identity theft by means of secure two-factor authentication (2FA). This variant of multi-factor authentication (MFA) uses, for example, a time-limited one-time password as a further authentication factor in addition to the user name and password.
Companies can provide the additional authentication factor for secure log-in via 2FA in a wide variety of ways. In addition to one-time passwords generated by special TOTP generators or transmitted by servers via e-mail, SMS or phone call, physical tokens such as smart cards and authentication keys can also be used to secure user accounts. The following six types of two-factor authentication are widely used:
The various two-factor authentication methods can also be combined. For example, in addition to using physical authentication keys such as Yubikey, companies can also enable their employees to log in with 2FA using TOTP one-time passwords. In this way, employees with a TOTP generator can still access their account even if they lose the physical key.
Due to the security shortcomings of two-factor authentication via SMS or e-mail and the entry barriers of smart cards and physical authentication keys, corporate online platforms and most online services primarily use time-based one-time passwords (TOTP). This is a method of generating time-limited one-time passwords (OTP) based on a common and secret key (shared secret). This cryptographic method was developed by the cross-industry Initiative For Open Authentication (OATH) and published as RFC 6238 in July 2011 as part of the Internet Engineering Task Force (IETF).
At its core, TOTP, which is free of patents as an open standard, is based on a cryptographic hash function (HMAC). This calculates a hash value from the current time and a previously agreed secret key. However, this one-time password is only valid for 30 seconds, so the sender and receiver must have sufficiently accurate clocks. So much for the theory. In practice, switching a user account to secure two-factor authentication with TOTP goes something like this:
Users usually use a software solution on their smartphone or desktop PC as a TOTP authenticator. Alternatively, a standalone hardware-based TOTP generator without an Internet connection can be used, which is much more secure, especially for corporate use.
Among the software solutions for TOTP passwords, Google Authenticator and Microsoft Authenticator are certainly among the best-known authenticator apps. However, there are also alternatives like Authy from Twilio or the open source applications Aegis Authenticator, andOTP as well as FreeOTP(+). Even password managers like KeePass, LastPass or 1Password now support two-factor authentication via TOTP. These applications often also work in flight mode without an existing Internet connection. Nevertheless, such software solutions harbor a residual risk. For example, the Android banking malware Cerberus, whose source code is freely available in underground forums, now also allows two-factor authentication codes to be tapped, according to Kaspersky’s security experts.
Hardware-based TOTP generators, on the other hand, offer the highest level of security for everyday corporate use. They store the secret TOTP keys in their own hardware, operate without an Internet connection and therefore cannot be attacked online. Some devices also offer integrated PIN protection. In the event of loss, this type of security function effectively protects against misuse because it only allows the authenticator to be used after the PIN has been entered. If the PIN is entered incorrectly several times, the device is usually reset to factory settings and all keys and accounts are deleted.
An important factor for all types of TOTP authenticators is their exact time of day. Depending on the implementation, online services may tolerate slight deviations in the time on the user’s TOTP authenticator. However, if the deviation is too large, the log-in fails. While apps use the Network Time Protocol (NTP) to synchronize the time over the Internet, hardware-based TOTP authenticators have sufficiently accurate clocks for calculating one-time passwords. And these can cause regular follow-up costs for companies in many cases.
Due to time deviations of the internal real-time clock, hardware solutions with built-in batteries are often only usable for two years for the provision of TOTP passwords. In contrast to many competitor products, which require a device replacement due to runtime, the REINER SCT Authenticator can be precisely synchronized again, for example, after a change of the three AAA batteries via the integrated camera. Via a patented QR camera process, the manufacturer also uses the Authenticator’s camera to change the language setting or time zone, as well as to import firmware updates with new functions and enhancements. While other hardware solutions can sometimes only be used for a single 2FA account, REINER SCT has used this method to provide a firmware update, for example, with which the device now manages 60 accounts instead of ten. This is sustainable and reduces costs in procurement and support.
Create a hack-proof web page Making your own website hack-proof
Cybersecurity on holiday Holiday time. Finally, relaxation. Away from work.
Qualifications of data protection officers A data protection officer ensures
Handling hacked emails The e-mail is indispensable as a communication