How are passwords and access management changing for mobile applications? Does two-factor authentication still...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
make sense when the application is accessed from the cell phone we're texting the second code to?
Regardless of the platform, passwords continue to be the same old problem creating the same old security headaches -- and risks. It started with mainframes. Then it became an issue with standalone and then networked computers. Web applications and now mobile apps have evolved and the problems are no different. Passwords are the weak link that we can’t seem to get our arms around.
Two-factor authentication is no doubt the answer to many of the traditional password weaknesses. Using two-factor in the context of text messages to the same devices does somewhat defeat the purpose of two-factor.
There are other ways you can implement two-factor with mobile apps. Be it via technologies such as the iPhone 5S’s Touch ID, one-time tokens and the like, two-factor can be implemented in just about any environment.
The technical controls are the easy part. It’s the human factors that are the most challenging.
The bigger question is: How viable is two-factor? Can it really become mainstream?
Based on what I’ve witnessed, the technical controls are the easy part. It’s the human factors that are the most challenging. Is two-factor realistic with your specific users?
Are people going to be willing to take the extra steps required? Will management support that approach? If the users and management don’t really want it, will developers have the incentive to integrate these technologies into their mobile apps?
The thing we have to remember is that human beings are going to take the path of least resistance with security. It’s really that simple. Be it with operating systems, Web applications, or mobile apps, when it comes to mobile access management, two-factor authentication looks great on paper. The vendor marketers are proud to flaunt it as the solution to your security woes. But unless and until users, developers and other stakeholders truly see the value, we’ll continue down the path of good old fashioned, often weak passwords.
Until we start seeing more authentication options built into the hardware like Apple has done with Touch ID -- similar to how unified extensible firmware interface (UEFI) is replacing the traditional PC BIOS and vendor solutions like Intel’s Anti-Theft technology are integrated into certain PC hardware -- I’m not convinced two-factor is going to make much of a splash with mobile apps.
Dig Deeper on Software Security Test Best Practices
Related Q&A from Kevin Beaver
Android Oreo replaced the allow unknown sources setting with a new feature that enables users to selectively install unknown apps. Kevin Beaver ...continue reading
Several vulnerabilities were recently discovered in Android bootloaders via the BootStomp tool. Kevin Beaver explains how they work and what risk ...continue reading
Equifax's Apache Struts vulnerability was an example of a scan not being read correctly. Kevin Beaver explains vulnerability scans and how issues can...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.