Difference between revisions of "Google Authenticator"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
− | [[wikipedia:Google Authenticator]] (2010) | + | [[wikipedia:Google Authenticator]] (2010) is a software-based [[authenticator]] by [[Google]] that implements [[two-step verification]] services using the [[Time-based One-time Password Algorithm]] (TOTP; specified in RFC 6238) and [[HMAC-based One-time Password algorithm]] (HOTP; specified in RFC 4226), for authenticating users of software applications.<ref>{{cite web|title=GitHub - google/google-authenticator: Open source version of Google Authenticator (except the Android app)|url=https://github.com/google/google-authenticator|website=GitHub|language=EN|quote=These implementations support the HMAC-Based One-time Password (HOTP) algorithm specified in RFC 4226 and the Time-based One-time Password (TOTP) algorithm specified in RFC 6238.}}</ref> |
Line 16: | Line 16: | ||
* {{Security}} | * {{Security}} | ||
− | + | {{CC license}} Source: wikipedia | |
[[Category:Security]] | [[Category:Security]] |
Revision as of 07:59, 2 May 2020
wikipedia:Google Authenticator (2010) is a software-based authenticator by Google that implements two-step verification services using the Time-based One-time Password Algorithm (TOTP; specified in RFC 6238) and HMAC-based One-time Password algorithm (HOTP; specified in RFC 4226), for authenticating users of software applications.[1]
The Android OS allows apps to protect their users by blocking other apps from screenshotting their content. This is done by adding a "FLAG_SECURE" option inside the app's configuration.
Related terms
See also
- ThreatFabric
- Yubikey
- FIDO2
- MFA: FreeOTP, Google Authenticator, Okta Verify, Duo Security, Microsoft Authenticator, Strong customer authentication, Dualshield, HOTP, TOTP, OATH, Authy, Push authentication, google-authenticator, Duo Mobile,
DenyAllExceptListedIfNoMFA
, Configure MFA on AWS, LastPass Authenticator mobile app - Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Source: wikipedia
- ↑ "GitHub - google/google-authenticator: Open source version of Google Authenticator (except the Android app)". GitHub.
These implementations support the HMAC-Based One-time Password (HOTP) algorithm specified in RFC 4226 and the Time-based One-time Password (TOTP) algorithm specified in RFC 6238.
<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
Advertising: