Remove tag 2fa
article thumbnail

Is an Apple Watch Enough?

Phil Windley

The problem with USAA was 2FA. Watch apps for 2FA are "companion apps" meaning they're worthless without the phone. For TOTP 2FA, I'd mirrored to my iPad, so that worked fine. I've already mentioned 2FA, another is maps. Tags: apple watch iphone. The one exception was USAA. USAA uses Verisign's VIP.

Apple 100
article thumbnail

Better Onboarding with Verifiable Credentials

Phil Windley

Choose whether to use 2FA or security questions to secure your account. I chose 2FA. Continue with 2FA. Tags: verifiable+credentials ssi identity web. Enter the four-digit code that was sent to the email address you gave in (1). Solve the captcha. Verify your phone number using SMS or WhatsApp (they recommend WhatsApp).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passwords Are Ruining the Web

Phil Windley

Then, if you use multi-factor authentication (and you should), you get to open up your phone, find the 2FA app, get the code, and type it in. Tags: identity passwords authentication ssi. You open up your password manager (a few clicks) and fill the username and only then does it show you the password field 1. Others don't.

article thumbnail

Identity and Consistent User Experience

Phil Windley

Different locations and modalities, different rules for passwords, different methods for 2FA, and so on. Tags: identity ux wallets ssi. You probably do it way too often. But it's also made much more complex because it's slightly different everywhere. It's maddening. There's a saying in security: "Don't roll your own crypto."

article thumbnail

Fixing Web Login

Phil Windley

Then, if you use multi-factor authentication (and you should), you get to open up your phone, find the 2FA app, get the code, and type it in. Tags: identity web mobile oauth cookies. You open up your password manager (a few clicks) and fill the username and only then does it show you the password field 1. Barth ( CC0 1.0 ).

article thumbnail

The Architecture of Identity Systems

Phil Windley

The controller usually generates the authentication factors by choosing a password, linking a two-factor authentication (2FA) mechanism, or generating keys. Tags: identity identifiers relationships ssi root+of+trust namespaces architecture trust. Photo Credit: Skysong Center from Phil Windley (CC BY-SA 3.0