Simon AsikaforUniAuthblog.uniauth.com·Nov 27, 2023[Secure 101] What are 2FA and MFA? Does My Website Need These Features?As digitalization becomes increasingly prevalent, we rely more on websites for various aspects of life and work, including shopping, banking, and social media. However, this convenience also brings many security risks. We often see news about online ...DiscussTwo-factor authentication (2FA)
Simon AsikaforUniAuthblog.uniauth.com·Nov 27, 2023[Secure 101] Is It Really Safe to Change Passwords Every 90 Days or Regularly?Traditional Idea: Users Should Change Passwords Frequently In the digital world, protecting personal and corporate information security is a crucial aspect of our daily lives. Over the years, corporate security policies have often advised us to regul...Discusspasswords
Mahira Technology Private LimitedPromahiratechnology.hashnode.dev·Oct 31, 2023AWS CloudFormation Template -Multi-Factor Authentication (MFA) for AWS IAM usersIntroduction: The provided #AWS CloudFormation template is a powerful tool for enforcing #Multi-Factor Authentication (MFA) policies within an #Amazon Web Services (AWS) Identity and #Access Management (IAM) environment. MFA is a critical security me...DiscussAWS
FXamel.hashnode.dev·Oct 22, 2023configure ssh with mfasudo apt install libpam-google-authenticator google-authenticator PAM (Pluggable Authentication Module) offers two types of tokens: sequential-based and time-based. Sequential-based tokens start at a certain point and increase after each use, whil...Discuss·3 likesssh
Keith CaseyforPangea Blogpangeacyber.hashnode.dev·Oct 16, 2023AuthN in Minutes: MFA, EULAs, and Social Auth out of the BoxWhen we think about Authentication, every developer has one of two reactions: The first is “I’ve got this'' and they quickly slap together a database and form and call it complete. Then they think about password hashing, account reset flows, and send...Discuss·72 readsSecurity
Chandrasekar(Chan) Rajaramcr88.hashnode.dev·Oct 14, 2023Enforcing Multi-Factor Authentication (MFA) in AWS via IAM PolicyIntroduction: In today's digital age, security is paramount. As organizations migrate to the cloud, ensuring that only authorized personnel can access resources becomes crucial. One of the most effective ways to enhance security is through Multi-Fact...Discuss·28 readsAWS
Tim SchindlerProtimschindler.blog·Oct 12, 2023Generating TOTPs for CyberArk Privileged Session Manager Webapp Connectors using a PreConnect DLLWith version 13.0 of CyberArk's Privileged Session Manager, as part of a Webapp PSM connector, you can inject a time-based one-time password. You can even store the secret for the TOTP in a separate account and link it as a logon account to secure it...Discuss·231 readscyberark
Kevin TauchmanforKevBot's Security Blogkevbotsec.hashnode.dev·Aug 22, 2023Implementing MFARecently I was tasked with setting up multi-factor authentication in a small business setting. Implementing Multi-Factor Authentication (MFA) in a small business setting is crucial for enhancing cybersecurity and protecting sensitive information. MFA...DiscussMFA
Rajaram Erraguntlarajaram-erraguntla.hashnode.dev·Jul 9, 2023🔒Day6of100 Days AWS Cloud Challenge-Lab-4 Strengthening AWS Account Security: Enable MFA for Enhanced Protection 🔒📚 Synopsis In this blog, we will learn how to enable MFA for your Account 📋 Prerequisites 📌 AWS Account (In case you do not have one, To create one follow this blog: AWS Account SignUp Free Tier Account 📌 Internet Connection. 📌 Download Twili...Discuss·64 readsAWS
Scott Spendolinispendolini.blog·Jul 4, 2023IDCS Multi-Factor AuthenticationNow that we have APEX delegating authentication and authorization services to IDCS, let's add another layer of security: multi-factor authentication. Multi-factor authentication - or MFA for short - provides an additional layer of security when signi...Discuss·12 likes·136 readsWho Are You?MFA