Difference between revisions of "Google Authenticator"
Jump to navigation
Jump to search
Tags: Mobile web edit, Mobile edit |
|||
Line 11: | Line 11: | ||
* [[FreeOTP]] | * [[FreeOTP]] | ||
* [[Hashcat]] | * [[Hashcat]] | ||
+ | * [[brew install google-authenticator-libpam]] | ||
== See also == | == See also == |
Revision as of 11:18, 11 November 2020
wikipedia:Google Authenticator (2010) is a software-based authenticator by Google that implements two-step verification services using the Time-based One-time Password Algorithm (TOTP; specified in RFC 6238) and HMAC-based One-time Password algorithm (HOTP; specified in RFC 4226), for authenticating users of software applications.[1]
The Android OS allows apps to protect their users by blocking other apps from screenshotting their content. This is done by adding a "FLAG_SECURE" option inside the app's configuration.
Related terms
- Authy (Twilio) (TOTP)
- Duo
- Ubuntu:
apt-get install libpam-google-authenticator
- FreeOTP
- Hashcat
- brew install google-authenticator-libpam
See also
- ThreatFabric
- Yubikey
- FIDO2
- MFA: FreeOTP, Google Authenticator, Okta Verify, Duo Security, Microsoft Authenticator, Strong customer authentication, Dualshield, HOTP, TOTP, OATH, Authy, Push authentication, google-authenticator, Duo Mobile,
DenyAllExceptListedIfNoMFA
, Configure MFA on AWS, LastPass Authenticator mobile app
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Source: wikipedia
- ↑ "GitHub - google/google-authenticator: Open source version of Google Authenticator (except the Android app)". GitHub.
These implementations support the HMAC-Based One-time Password (HOTP) algorithm specified in RFC 4226 and the Time-based One-time Password (TOTP) algorithm specified in RFC 6238.
<templatestyles src="Module:Citation/CS1/styles.css"></templatestyles>
Advertising: