Table of Contents
Preface
Part 1: Introduction
1
On the Internet, Nobody Knows You’re a Dog
Identity and digital identity
Workforce identity
Customer identity
Additional authentication and security controls
What are authentication factors?
Summary
2
When to Use Different Types of MFA
Not all MFA is created equal – when to use different types of MFA
Why use MFA then?
Different types of MFA
SIM swap and why SMSs and voice messages are the weakest authenticator factor types to use
What can the service provider do?
What can the user do?
MFA fatigue – also known as MFA push spam
What can the service provider do?
Phishing-resistant MFA
Keeping up with bad actors – good sources for up-to-date information on MFA and related topics
Cybersecurity and ...
Get Implementing Multifactor Authentication now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.