O'Reilly logo

Open Source Identity Management Patterns and Practices Using OpenAM 10.x by Waylon Kenning

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Two Factor Authentication

In the last chapter we covered OAuth as a way of integrating our OpenAM installation to an existing cloud based identity provider. This is a great way of providing a good experience to users, especially on mobile devices. But sometimes there is a requirement for a higher standard of authorization requiring the use of two factor authentication. This chapter will describe setting up two factor authentication in OpenAM.

Understanding two factor authentication

Two factor authentication refers to the use of a secondary identity credential used for authentication. Typically this is a unique token generated by hardware or software.

Two factor authentication is used when there is a requirement for greater than normal ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required