Introduction
Best practices for user authentication and access control
()
1. User Authentication
The importance of authentication
()
Authentication factors
()
Credentials
()
Multi-factor authentication
()
Pitfalls of multi-factor authentication
()
Biometric authentication
()
2. Passwords
Encryption and hashing
()
Brute force attacks
()
Speed and throttling
()
Dictionary attacks
()
Salted passwords
()
Strong passwords
()
3. Manage Passwords
Password requirements
()
Password theft and reuse
()
Password managers
()
Handle forgotten passwords
()
Use HTTPS and TLS
()
4. Access Control
Insecure references
()
Regulate access privileges
()
Cookies and sessions
()
Deny lists and geofilters
()
Single sign-on services
()
Deactivate user access
()