SlideShare a Scribd company logo
2FA BEST PRACTICES
How to secure your applications with Authy
TWILIOUSER&DEVELOPERCONFERENCE
KELLEY ROBINSON
DEVELOPER EVANGELIST
2FA BEST PRACTICES
How to secure your applications with Authy
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
FERDINAND PEREZ
SOLUTIONS ARCHITECT
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
WHY 2FA?
haveibeenpw n ed. c om
2FA Best Practices
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
2FA TERMINOLOGY
OTP (ONE TIME PASSWORD)
• Generic term
• Single use tokens, usually numeric
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
WHY IS SMS 2FA "BAD"?
• SS7 vulnerabilities
• SIM swapping (social engineering)
Link: The Post SS7 Future of 2FA
But it's not perfect
SMS 2FA IS
BETTER THAN
NO 2FA
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
SMS ALTERNATIVES
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
Push
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
TOTP
(Time-based One Time Passwords)
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
2FA ONBOARDING
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
🔓SIGNED IN CONTENT🔓
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
2FA USER
EXPERIENCE
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
ACCOUNT SECURITY
SESSIONS AT SIGNAL
LUCAS VIDAL
ENGINEERING MANAGER
2FA IMPLEMENTATION
BEST PRACTICES
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
JOSH STAPLES
SENIOR SALES ENGINEER
Dive deeper into 2FA implementation
DAN KILLMER
SALES ENGINEERING MANAGER
BUILDING PHONE VERIFICATION
AT SCALE
Phone verification seems like a simple thing to build on Twilio right? Create
a random code, send it via SMS and then check it? Not so fast! 
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
SIMON THORPE
DIRECTOR, PRODUCT MARKETING
HOW TO AUTHENTICATE CALLERS AND PREVENT
SOCIAL ENGINEERING ATTACKS USING TWILIO FLEX
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
JULIAN CANTILLO
SOFTWARE ENGINEER
With Twilio Flex, we have much more modern methods of authentication to
simplify not only inbound, but also outbound calls.
KELLEY ROBINSON
DEVELOPER EVANGELIST
PRACTICAL CRYPTOGRAPHY
Get an introduction to Public Key Cryptography and learn how Twilio uses it
inside the Authy app.
© 2018 TWILIO, INC. ALL RIGHTS RESERVED.
THANK YOU!
TWILIOUSER&DEVELOPERCONFERENCE
KELLEY ROBINSON
KROBINSON@TWILIO.COM
FERDINAND PEREZ
FPEREZ@TWILIO.COM

More Related Content

PDF
Designing customer account recovery in a 2FA world
PDF
Introduction to SHAKEN/STIR
PDF
PSD2, SCA, WTF?
PDF
Auth on the web: better authentication
PDF
Identiverse 2020 - Account Recovery with 2FA
PDF
WebAuthn
PDF
2FA in 2020 and Beyond
PDF
Passwordless is Possible - How to Remove Passwords and Improve Security
Designing customer account recovery in a 2FA world
Introduction to SHAKEN/STIR
PSD2, SCA, WTF?
Auth on the web: better authentication
Identiverse 2020 - Account Recovery with 2FA
WebAuthn
2FA in 2020 and Beyond
Passwordless is Possible - How to Remove Passwords and Improve Security

What's hot (20)

PPTX
Passwordless auth
PDF
HYPR: The Leading Provider of True Passwordless Security®
PDF
Managing Mobile Business Insecurities
PDF
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
PDF
Mobile Security: The 5 Questions Modern Organizations Are Asking
PPTX
Mobile Security - 2015 Wrap-up and 2016 Predictions
PDF
5 Ways to Protect your Mobile Security
PDF
Passwordless Authentication
PPTX
Outside the Office: Mobile Security
PDF
2015 Mobile Security Trends: Are You Ready?
PDF
New trends in Payments Security: NFC & Mobile
PDF
Top 7 Mobile Banking Security Tips
PDF
Mobile App Security Predictions 2019
PDF
2015 Cybersecurity Predictions
PPTX
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PDF
Mobile Security at the World Cup
PPTX
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
PDF
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
PPTX
Top 2016 Mobile Security Threats and your Employees
Passwordless auth
HYPR: The Leading Provider of True Passwordless Security®
Managing Mobile Business Insecurities
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security - 2015 Wrap-up and 2016 Predictions
5 Ways to Protect your Mobile Security
Passwordless Authentication
Outside the Office: Mobile Security
2015 Mobile Security Trends: Are You Ready?
New trends in Payments Security: NFC & Mobile
Top 7 Mobile Banking Security Tips
Mobile App Security Predictions 2019
2015 Cybersecurity Predictions
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Mobile Security at the World Cup
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
Top 2016 Mobile Security Threats and your Employees
Ad

Similar to 2FA Best Practices (20)

PDF
Effective 2FA - Part 1: the technical stuff
PDF
Two-Steps to Owning MFA
PDF
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
PDF
Protecting your phone verification flow from fraud & abuse
PDF
Shared responsibility model: Why and how to choose the right 2 fa method for ...
PDF
Authentication Beyond SMS
PDF
PDF
2FA, WTF!?
PPTX
Mobile Two Factor Authentication
PPTX
New Opportunities with Two Factor Authentication (2FA) - A How To
PDF
New Opportunities with Two Factor Authentication (2FA) - A How To
PPT
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
PPTX
Seminar-Two Factor Authentication
PPTX
Two factor authentication presentation mcit
PDF
OWASP Global AppSec Dublin 2023 [T]OTPs are not as secure as you might believe
PDF
How to Implement Website Authentication By MyOtpApp
PPSX
Welcome to the 3rd generation in user authentication
PPTX
Privileged Access Management (PAM): A Deep Dive into Modern Authentication: O...
PDF
Transecq ITA
PPTX
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Effective 2FA - Part 1: the technical stuff
Two-Steps to Owning MFA
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Protecting your phone verification flow from fraud & abuse
Shared responsibility model: Why and how to choose the right 2 fa method for ...
Authentication Beyond SMS
2FA, WTF!?
Mobile Two Factor Authentication
New Opportunities with Two Factor Authentication (2FA) - A How To
New Opportunities with Two Factor Authentication (2FA) - A How To
Mobey Forum Oslo Aradiom Presentation - How to Choose 2FA Security Solution
Seminar-Two Factor Authentication
Two factor authentication presentation mcit
OWASP Global AppSec Dublin 2023 [T]OTPs are not as secure as you might believe
How to Implement Website Authentication By MyOtpApp
Welcome to the 3rd generation in user authentication
Privileged Access Management (PAM): A Deep Dive into Modern Authentication: O...
Transecq ITA
Post password era - Bernard Toplak, OWASP Croatia Meetup 2016
Ad

More from Kelley Robinson (19)

PDF
Preventing phone verification fraud (SMS pumping)
PDF
Introduction to Public Key Cryptography
PDF
Intro to SHAKEN/STIR
PDF
Building a Better Scala Community
PDF
BSides SF - Contact Center Authentication
PDF
Communication @ Startups
PDF
Contact Center Authentication
PDF
BSides PDX - Threat Modeling Authentication
PDF
SIGNAL - Practical Cryptography
PDF
Practical Cryptography
PDF
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
PDF
Analyzing Pwned Passwords with Spark and Scala
PDF
Practical Cryptography
PDF
Analyzing Pwned Passwords with Spark and Scala
PDF
2FA, OTP, WTF?
PDF
Forget what you think you know: Redefining functional programming for Scala
PDF
Demystifying Scala
PDF
Functional Programming Essentials
PDF
Why The Free Monad isn't Free
Preventing phone verification fraud (SMS pumping)
Introduction to Public Key Cryptography
Intro to SHAKEN/STIR
Building a Better Scala Community
BSides SF - Contact Center Authentication
Communication @ Startups
Contact Center Authentication
BSides PDX - Threat Modeling Authentication
SIGNAL - Practical Cryptography
Practical Cryptography
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark and Scala
Practical Cryptography
Analyzing Pwned Passwords with Spark and Scala
2FA, OTP, WTF?
Forget what you think you know: Redefining functional programming for Scala
Demystifying Scala
Functional Programming Essentials
Why The Free Monad isn't Free

Recently uploaded (20)

PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Geodesy 1.pptx...............................................
PPT
Total quality management ppt for engineering students
DOCX
573137875-Attendance-Management-System-original
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
R24 SURVEYING LAB MANUAL for civil enggi
Safety Seminar civil to be ensured for safe working.
Fundamentals of safety and accident prevention -final (1).pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Mechanical Engineering MATERIALS Selection
Geodesy 1.pptx...............................................
Total quality management ppt for engineering students
573137875-Attendance-Management-System-original
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Categorization of Factors Affecting Classification Algorithms Selection
Automation-in-Manufacturing-Chapter-Introduction.pdf
Fundamentals of Mechanical Engineering.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
R24 SURVEYING LAB MANUAL for civil enggi

2FA Best Practices