Eddi Freiterblog.freiter.com·Dec 8, 2024Simple and cost-effective MFA deployment with TOTPWritten by Eddi Freiter in collaboration with Will Neumann Organizations of all sizes are increasingly using productivity tools and applications hosted in the cloud. However, providing secure access to user information and sensitive data remains a si...MFA
Mukul Aryalblog.mukul.com.np·Aug 26, 2024Understand how Google Authenticator works by building a Django AppHave you ever used apps like Google Authenticator and Microsoft authenticator for two-factor authentication? These applications provide an easy-to-use and safe method for authenticating your account across many different websites. You may want to int...114 readsDjango
Saleh Alhaddadsalehalhaddad.hashnode.dev·Aug 9, 2024Time-based One-time Password (TOTP)?, How to use it in Ruby On Rails API?Intro Security is paramount in today's digital world. Two-factor authentication (2FA) adds an extra layer of protection beyond just usernames and passwords. While SMS OTP is a common 2FA method, it can be costly, but TOTP (Time-Based One-Time Passwo...10 likes·263 readsRuby
SuperTokenssupertokens.hashnode.dev·Jan 19, 2024The Multifaceted Benefits of Multi-Factor AuthenticationIn 2022, over 80% of data breaches were attributed to compromised passwords. Although email-password based authentication has become the de facto method for authentication, it is very vulnerable to attacks. Through phishing, keylogging or simple brut...FIDO
Raphael Carlos Regoraphaelcarlosr.hashnode.dev·Mar 13, 2023🔐How to decode and use 2FA code generated by TOTP Algorithm 🤖You may have entered a 6-digit code from a 2FA app like Google Authenticator 😬, but where did this code come from? The answer lies within the QR code and the inner workings of the Time-based One-time Password algorithm (TOTP) 🔍. In this article, we...346 reads2FA