<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Authentication on System Overlord</title><link>https://systemoverlord.com/tags/authentication.html</link><description>Recent content in Authentication on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Thu, 07 May 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/authentication/index.xml" rel="self" type="application/rss+xml"/><item><title>Security 101: Two Factor Authentication (2FA)</title><link>https://systemoverlord.com/2020/05/07/security-101-two-factor-authentication-2fa.html</link><pubDate>Thu, 07 May 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/05/07/security-101-two-factor-authentication-2fa.html</guid><description>&lt;p&gt;In this part of my &amp;ldquo;Security 101&amp;rdquo; series, I want to talk about different
mechanisms for two factor authentication (2FA) as well as why we need it in the
first place. Most of my considerations will be for the web and web
applications, and I&amp;rsquo;m explicitly ignoring local login (e.g., device unlock)
because the threat model is so different.&lt;/p&gt;</description></item></channel></rss>