<--- Back to Details
First PageDocument Content
One-time password / Two-factor authentication / Authentication / Password / Federated identity / Security token / HOTP / Security / Computer security / Access control
Date: 2014-09-24 13:06:57
One-time password
Two-factor authentication
Authentication
Password
Federated identity
Security token
HOTP
Security
Computer security
Access control

YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0

Add to Reading List

Source URL: www.yubico.com

Download Document from Source Website

File Size: 348,69 KB

Share Document on Facebook

Similar Documents

Computer access control / Computing / Cryptography / Computer security / YubiKey / HMAC-based One-time Password Algorithm / Universal 2nd Factor / Time-based One-time Password Algorithm / One-time password / Dropbox / CCID / LastPass

YubiKey 4 and YubiKey 4 Nano • YubiKey 4 and YubiKey 4 Nano offers strong authentication via Yubico one-time passwords (OTP), FIDO Universal 2nd Factor (U2F), and smart card (PIV, OpenPGP, OATH-TOTP, and OATH-HOTP) --

DocID: 1oc5c - View Document

Computer access control / HMAC-based One-time Password Algorithm / YubiKey / Time-based One-time Password Algorithm / Security token / One-time password / Access token / Token / Multi-factor authentication / Self-service password reset / Authentication / Password

Yubico Best Practices: OATH-HOTP

DocID: 1nci1 - View Document

One-time password / Internet protocols / HOTP / USB / USB human interface device class / Universal Serial Bus / Two-factor authentication / Human interface device / USB flash drive / Computer security / Computing / Security

The YubiKey Manual Usage, configuration and introduction of basic concepts Version: 3.4 Date: 27 March, 2015

DocID: 1fZMV - View Document

Internet protocols / One-time password / Two-factor authentication / HOTP / Password / SecurID / Secure Shell / Authentication / Security token / Security / Cryptography / Computer security

Version 1.0 Cornelius Kölbel () MayCC BY-NC-SA 4.0) Everybody knows that a password - be it simple or even complex - is a potential vulnerability. Two factor authentication is the way to authen

DocID: 15LKk - View Document

rtIER poEL reAT hoTp D’ ksOR wRAorPP

DocID: 14AM7 - View Document