SlideShare uma empresa Scribd logo
1 de 60
Baixar para ler offline
security
keys
Paul Schreiberpaulschreiber@gmail.com
@paulschreiber
know
are
have
NIST Special
Publication
800-63BDigital Identity Guidelines
Authentication and Lifecycle Management
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
yubico.com/gafw/
50%
off
os in-browser u2f support
macOS iOS Linux Android Windows
USB ✔ ✘ ✔ ✘ ✔
Bluetooth ✘ ✔ ✘ ✔ ✘
NFC ✘ ✘ ✘ ✔ ✘
github.com/

Safari-FIDO-U2F/
Safari-FIDO-U2F
WebAuthn 
dongleauth.info
wordpress.org/
plugins/
two-factor/
wordpress.org/
plugins/
google-apps-
login/
SSH
Many graphics from The Noun Project

Computer by Azis; Credit card Gonzalo Bravo; Email by Bryn Taylor; Fingerprint by
Ben Davis; Lock with keyhole by Brennan Novak; Nokia 3310 by Stan Fisher;
Shield by Wayne Thayer; Star by Thays Malcher; Warning by Icomatic.

Mais conteúdo relacionado

Mais procurados

Honeywell gsmvlp5-honeywell-ilp5-install-guide
Honeywell gsmvlp5-honeywell-ilp5-install-guideHoneywell gsmvlp5-honeywell-ilp5-install-guide
Honeywell gsmvlp5-honeywell-ilp5-install-guideAlarm Grid
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnVi Tính Hoàng Nam
 
American Fibertek RR-980C User Manual
American Fibertek RR-980C User ManualAmerican Fibertek RR-980C User Manual
American Fibertek RR-980C User ManualJMAC Supply
 
Brochure Simsa Eng
Brochure Simsa EngBrochure Simsa Eng
Brochure Simsa EngMyti S.r.l.
 
IT Lunch and Learn Final
IT Lunch and Learn FinalIT Lunch and Learn Final
IT Lunch and Learn FinalBen Wright
 
Paxton Access 460-210-US Instruction Manual
Paxton Access 460-210-US Instruction ManualPaxton Access 460-210-US Instruction Manual
Paxton Access 460-210-US Instruction ManualJMAC Supply
 
Viking K 1900-3 - Door Entry Dialer 250 apt
Viking K 1900-3 - Door Entry Dialer 250 aptViking K 1900-3 - Door Entry Dialer 250 apt
Viking K 1900-3 - Door Entry Dialer 250 aptlcdtcorp
 
Tl wr743 nd-v2_user_guide
Tl wr743 nd-v2_user_guideTl wr743 nd-v2_user_guide
Tl wr743 nd-v2_user_guidecristian975
 
Edwards Signaling B-KHD-1000-PP Installation Manual
Edwards Signaling B-KHD-1000-PP Installation ManualEdwards Signaling B-KHD-1000-PP Installation Manual
Edwards Signaling B-KHD-1000-PP Installation ManualJMAC Supply
 
Matrix Telecom Solutions: SIMADO GFXD1111S - FCT
Matrix Telecom Solutions: SIMADO GFXD1111S - FCTMatrix Telecom Solutions: SIMADO GFXD1111S - FCT
Matrix Telecom Solutions: SIMADO GFXD1111S - FCTMatrix Comsec
 
[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system운상 조
 
American Fibertek MX4-1000TX User Manual
American Fibertek MX4-1000TX User ManualAmerican Fibertek MX4-1000TX User Manual
American Fibertek MX4-1000TX User ManualJMAC Supply
 

Mais procurados (17)

Honeywell gsmvlp5-honeywell-ilp5-install-guide
Honeywell gsmvlp5-honeywell-ilp5-install-guideHoneywell gsmvlp5-honeywell-ilp5-install-guide
Honeywell gsmvlp5-honeywell-ilp5-install-guide
 
H ap qg
H ap qgH ap qg
H ap qg
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
American Fibertek RR-980C User Manual
American Fibertek RR-980C User ManualAmerican Fibertek RR-980C User Manual
American Fibertek RR-980C User Manual
 
JasonDD214Short2.PDF
JasonDD214Short2.PDFJasonDD214Short2.PDF
JasonDD214Short2.PDF
 
Brochure Simsa Eng
Brochure Simsa EngBrochure Simsa Eng
Brochure Simsa Eng
 
IT Lunch and Learn Final
IT Lunch and Learn FinalIT Lunch and Learn Final
IT Lunch and Learn Final
 
FCC License
FCC LicenseFCC License
FCC License
 
Paxton Access 460-210-US Instruction Manual
Paxton Access 460-210-US Instruction ManualPaxton Access 460-210-US Instruction Manual
Paxton Access 460-210-US Instruction Manual
 
Viking K 1900-3 - Door Entry Dialer 250 apt
Viking K 1900-3 - Door Entry Dialer 250 aptViking K 1900-3 - Door Entry Dialer 250 apt
Viking K 1900-3 - Door Entry Dialer 250 apt
 
Tl wr743 nd-v2_user_guide
Tl wr743 nd-v2_user_guideTl wr743 nd-v2_user_guide
Tl wr743 nd-v2_user_guide
 
Tl wa701 nd user guide
Tl wa701 nd user guideTl wa701 nd user guide
Tl wa701 nd user guide
 
Edwards Signaling B-KHD-1000-PP Installation Manual
Edwards Signaling B-KHD-1000-PP Installation ManualEdwards Signaling B-KHD-1000-PP Installation Manual
Edwards Signaling B-KHD-1000-PP Installation Manual
 
Matrix Telecom Solutions: SIMADO GFXD1111S - FCT
Matrix Telecom Solutions: SIMADO GFXD1111S - FCTMatrix Telecom Solutions: SIMADO GFXD1111S - FCT
Matrix Telecom Solutions: SIMADO GFXD1111S - FCT
 
20109149225111
2010914922511120109149225111
20109149225111
 
[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system[GITSN] intelligent eavesdropping detection system
[GITSN] intelligent eavesdropping detection system
 
American Fibertek MX4-1000TX User Manual
American Fibertek MX4-1000TX User ManualAmerican Fibertek MX4-1000TX User Manual
American Fibertek MX4-1000TX User Manual
 

Mais de Paul Schreiber

Brooklyn Soloists: personal digital security
Brooklyn Soloists: personal digital securityBrooklyn Soloists: personal digital security
Brooklyn Soloists: personal digital securityPaul Schreiber
 
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folksCreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folksPaul Schreiber
 
WordCamp for Publishers: Security for Newsrooms
WordCamp for Publishers: Security for NewsroomsWordCamp for Publishers: Security for Newsrooms
WordCamp for Publishers: Security for NewsroomsPaul Schreiber
 
VIP Workshop: Effective Habits of Development Teams
VIP Workshop: Effective Habits of Development TeamsVIP Workshop: Effective Habits of Development Teams
VIP Workshop: Effective Habits of Development TeamsPaul Schreiber
 
WordPress NYC: Information Security
WordPress NYC: Information SecurityWordPress NYC: Information Security
WordPress NYC: Information SecurityPaul Schreiber
 
WPNYC: Moving your site to HTTPS
WPNYC: Moving your site to HTTPSWPNYC: Moving your site to HTTPS
WPNYC: Moving your site to HTTPSPaul Schreiber
 
NICAR delivering the news over HTTPS
NICAR delivering the news over HTTPSNICAR delivering the news over HTTPS
NICAR delivering the news over HTTPSPaul Schreiber
 
WordCamp US: Delivering the news over HTTPS
WordCamp US: Delivering the news over HTTPSWordCamp US: Delivering the news over HTTPS
WordCamp US: Delivering the news over HTTPSPaul Schreiber
 
BigWP: Delivering the news over HTTPS
BigWP: Delivering the news over HTTPSBigWP: Delivering the news over HTTPS
BigWP: Delivering the news over HTTPSPaul Schreiber
 
Delivering the news over HTTPS
Delivering the news over HTTPSDelivering the news over HTTPS
Delivering the news over HTTPSPaul Schreiber
 
Web Scraping with Python
Web Scraping with PythonWeb Scraping with Python
Web Scraping with PythonPaul Schreiber
 
D'oh! Avoid annoyances with Grunt.
D'oh! Avoid annoyances with Grunt.D'oh! Avoid annoyances with Grunt.
D'oh! Avoid annoyances with Grunt.Paul Schreiber
 
Getting to Consistency
Getting to ConsistencyGetting to Consistency
Getting to ConsistencyPaul Schreiber
 
EqualityCamp: Lessons learned from the Obama Campaign
EqualityCamp: Lessons learned from the Obama CampaignEqualityCamp: Lessons learned from the Obama Campaign
EqualityCamp: Lessons learned from the Obama CampaignPaul Schreiber
 

Mais de Paul Schreiber (18)

Brooklyn Soloists: personal digital security
Brooklyn Soloists: personal digital securityBrooklyn Soloists: personal digital security
Brooklyn Soloists: personal digital security
 
BigWP live blogs
BigWP live blogsBigWP live blogs
BigWP live blogs
 
CreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folksCreativeMornings FieldTrip: information security for creative folks
CreativeMornings FieldTrip: information security for creative folks
 
WordCamp for Publishers: Security for Newsrooms
WordCamp for Publishers: Security for NewsroomsWordCamp for Publishers: Security for Newsrooms
WordCamp for Publishers: Security for Newsrooms
 
VIP Workshop: Effective Habits of Development Teams
VIP Workshop: Effective Habits of Development TeamsVIP Workshop: Effective Habits of Development Teams
VIP Workshop: Effective Habits of Development Teams
 
WordPress NYC: Information Security
WordPress NYC: Information SecurityWordPress NYC: Information Security
WordPress NYC: Information Security
 
WPNYC: Moving your site to HTTPS
WPNYC: Moving your site to HTTPSWPNYC: Moving your site to HTTPS
WPNYC: Moving your site to HTTPS
 
NICAR delivering the news over HTTPS
NICAR delivering the news over HTTPSNICAR delivering the news over HTTPS
NICAR delivering the news over HTTPS
 
WordCamp US: Delivering the news over HTTPS
WordCamp US: Delivering the news over HTTPSWordCamp US: Delivering the news over HTTPS
WordCamp US: Delivering the news over HTTPS
 
BigWP: Delivering the news over HTTPS
BigWP: Delivering the news over HTTPSBigWP: Delivering the news over HTTPS
BigWP: Delivering the news over HTTPS
 
Delivering the news over HTTPS
Delivering the news over HTTPSDelivering the news over HTTPS
Delivering the news over HTTPS
 
Web Scraping with Python
Web Scraping with PythonWeb Scraping with Python
Web Scraping with Python
 
D'oh! Avoid annoyances with Grunt.
D'oh! Avoid annoyances with Grunt.D'oh! Avoid annoyances with Grunt.
D'oh! Avoid annoyances with Grunt.
 
Getting to Consistency
Getting to ConsistencyGetting to Consistency
Getting to Consistency
 
Junk Mail
Junk MailJunk Mail
Junk Mail
 
EqualityCamp: Lessons learned from the Obama Campaign
EqualityCamp: Lessons learned from the Obama CampaignEqualityCamp: Lessons learned from the Obama Campaign
EqualityCamp: Lessons learned from the Obama Campaign
 
Mac Productivity 101
Mac Productivity 101Mac Productivity 101
Mac Productivity 101
 
How NOT to rent a car
How NOT to rent a carHow NOT to rent a car
How NOT to rent a car
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

BigWP Security Keys

  • 3.
  • 4.
  • 5.
  • 7. are
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. NIST Special Publication 800-63BDigital Identity Guidelines Authentication and Lifecycle Management
  • 24. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 25. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 26. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 27. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 35.
  • 36. os in-browser u2f support macOS iOS Linux Android Windows USB ✔ ✘ ✔ ✘ ✔ Bluetooth ✘ ✔ ✘ ✔ ✘ NFC ✘ ✘ ✘ ✔ ✘
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 52.
  • 53.
  • 56.
  • 57.
  • 58. SSH
  • 59.
  • 60. Many graphics from The Noun Project Computer by Azis; Credit card Gonzalo Bravo; Email by Bryn Taylor; Fingerprint by Ben Davis; Lock with keyhole by Brennan Novak; Nokia 3310 by Stan Fisher; Shield by Wayne Thayer; Star by Thays Malcher; Warning by Icomatic.