SlideShare a Scribd company logo
Auth on the web:
Better Authentication


Kelley Robinson


Account Security Developer Evangelist | Twilio
https:/
/twitter.com/jessitron/status/1425255150998937604
Friction
Security
Friction
Security
Friction
Security
Controls
Auth on the web: better authentication
Auth on the web: better authentication
Auth on the web:
Better Authentication


Kelley Robinson


Account Security Developer Evangelist | Twilio
🐦 @KelleyRobinson


📍 Brooklyn, NY


🔐 Account Security @ Twilio


🥪 Home cook & sandwich enthusiast
👀 Biometric authentication


🌐 Background signals


📱 Devices as keys


💡 Recommendations
AGENDA
It is mainly time, and not money, that users
risk losing when attacked. It is also time
that security advice asks of them.
”
Cormac Herley, The Rational Rejection of Security Advice by Users (2009)
”
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
What is friction in


account security?
• Additional time or steps taken by the end user to prove
their identity.


• Decreases fraud and spam; helps ensure real users.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
What is frictionless


authentication?
• Controls shifted from the end user to the application
technology.


• Requires less (or no) time or action from the end user.
👀 BIOMETRIC AUTHENTICATION
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
👀 Biometric authentication
Something you are or do; an inherence factor
Examples
CHARACTERISTICS


iPhone Touch ID or


Android face unlock
VOICE RECOGNITION


More often used in


call centers
KEYSTROKE DYNAMICS


Behavior based analysis
😃 Pros


• Everyone has access to
what they are


• Can't lose the factor*


• Less concern for account
recovery
🤔 Cons


• Often per-device


• Elevated risk of underlying data
being targeted if using cloud storage


• User privacy concerns


• Documented bias in voice
recognition models
BIOMETRICS
https://www.nbcnews.com/think/opinion/remote-testing-monitored-ai-failing-students-forced-undergo-it-ncna1246769
https://www.nytimes.com/2020/03/23/technology/speech-recognition-bias-apple-amazon-google.html
https:/
/twitter.com/mholt6/status/1033809745755365376
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
👀 Biometric authentication
Incredibly useful, as long as we build
applications to use it responsibly
🌐 BACKGROUND SIGNALS
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Contextual data, often provided by the end
user's platform or device
🌐 Background signals
Examples
GEOLOCATION


Used for authorization and
more.
HEADER ENRICHMENT


AKA silent authentication
sends device details like IMSI
HISTORICAL BEHAVIOR


Purchase history or usage
patterns
BACKGROUND CHECKS
😃 Pros


• Outliers are apparent with
robust data


• Basic checks are easy to
implement
🤔 Cons


• Outliers can be legitimate use cases


• More complex analysis requires more
data engineering


• Privacy and regulatory concerns
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
🌐 Background signals
A useful signal for step up authentication but
not always a complete solution
📱 DEVICES AS KEYS
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
📱 Devices as keys
Uses public key cryptography to turn your
phone into a secure key
Examples
WEBAUTHN


Open standard for web
authentication. Uses browser
APIs (~90% supported).
PUSH AUTHENTICATION


Approve/deny framework similar to
WebAuthn but built into a mobile
or web application.
DEVICES AS KEYS
🤔 Cons


• Per-device


• Account recovery is challenging


• Device support is not ubiquitous
😃 Pros


• Can be a password
replacement


• Phishing & spoofing proof


• Already using devices like
our phones and computers
every day
Limited authenticator
availability for WebAuthn
• Roaming authenticators are expensive


• Platform authenticators are not ubiquitous
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
📱 Devices as keys
Excellent for heavy mobile usage companies.
Will be more common as more devices
become platform authenticators.
💡 RECOMMENDATIONS
Limit the data you need
to store
RECOMMENDATIONS
Use contextual data and
behavior biometrics as
background signals to
trigger step up
authentication
RECOMMENDATIONS
Offer device
authentication for users
that can support it
RECOMMENDATIONS
Embrace fallback options
in case of lost devices or
biometric glitches
RECOMMENDATIONS
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Open discussion
• What do you do to decrease friction in
your high risk transactions?


• What tools do you wish existed for
better authentication?
@kelleyrobinson
THANK YOU
krobinson@twilio.com
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
References
• A usability study of five two-factor authentication methods


• A Tale of Two Studies: The Best and Worst of YubiKey Usability


• Google security exec: 'Passwords are dead'


• Frictionless mobile authentication coming to the UK


• A simpler and safer future — without passwords


• The Rational Rejection of Security Advice by Users (2009)


• Remote testing monitored by AI is failing the students forced to
undergo it


• There Is a Racial Divide in Speech-Recognition Systems,
Researchers Say (Published 2020)


• Yubikey 5 Series


• https://caniuse.com/?search=webauthn


• https://twitter.com/mholt6/status/1033809745755365376


• https://twitter.com/jessitron/status/1425255150998937604


• https://twitter.com/kelleyrobinson/status/
1369385723615404033


• https://twil.io/webauthn


• Photos: Unsplash

More Related Content

PDF
Designing customer account recovery in a 2FA world
PDF
Introduction to SHAKEN/STIR
PDF
Identiverse 2020 - Account Recovery with 2FA
PDF
2FA Best Practices
PDF
PSD2, SCA, WTF?
PDF
WebAuthn
PDF
2FA in 2020 and Beyond
PDF
Clear and Present Danger
Designing customer account recovery in a 2FA world
Introduction to SHAKEN/STIR
Identiverse 2020 - Account Recovery with 2FA
2FA Best Practices
PSD2, SCA, WTF?
WebAuthn
2FA in 2020 and Beyond
Clear and Present Danger

What's hot (20)

PPTX
Passwordless auth
PDF
Passwordless is Possible - How to Remove Passwords and Improve Security
PDF
HYPR: The Leading Provider of True Passwordless Security®
PPTX
Managing Identity without Boundaries
PPT
You Can't Spell Enterprise Security without MFA
PDF
Managing Mobile Business Insecurities
PDF
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
PPTX
Connecting The Real World With The Virtual World
PPTX
Mobile Security - 2015 Wrap-up and 2016 Predictions
PDF
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
PDF
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
PDF
Passwordless Authentication
PPT
Identity-Defined Privacay & Security for Internet of Things
PDF
The Case For Next Generation IAM
PDF
CIS14: Filling the “authentication goes here” Hole in Identity
PPTX
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PPTX
Catalyst 2015: Patrick Harding
PPTX
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
PDF
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
Passwordless auth
Passwordless is Possible - How to Remove Passwords and Improve Security
HYPR: The Leading Provider of True Passwordless Security®
Managing Identity without Boundaries
You Can't Spell Enterprise Security without MFA
Managing Mobile Business Insecurities
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Connecting The Real World With The Virtual World
Mobile Security - 2015 Wrap-up and 2016 Predictions
CIS 2015-Putting Control Back in the Users’ Hands- David Pollington
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Passwordless Authentication
Identity-Defined Privacay & Security for Internet of Things
The Case For Next Generation IAM
CIS14: Filling the “authentication goes here” Hole in Identity
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Catalyst 2015: Patrick Harding
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
Ad

Similar to Auth on the web: better authentication (20)

PPTX
Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...
PDF
QA Fest 2019. Диана Пинчук. Тестирование аутентификации и авторизации (AuthN ...
PDF
Brafton White Paper Example
PPTX
Passwords are passé. WebAuthn is simpler, stronger and ready to go
PPTX
Hardware Authentication
PDF
Making User Authentication More Usable
PPTX
Authentifusion: Clarifying the Future of Customer Authentication
PDF
Access Control
PDF
Authentication.Next
PDF
Securing a Web App with Passwordless Web Authentication
PPTX
Digital authentication
PDF
AuthN & AuthZ testing: it’s not only about the login form
PDF
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
PDF
Secure All Teh Things - Add 2 factor authentication to your own CFML projects
PDF
Web Authn & Security Keys: Unlocking the Key to Authentication
PPTX
WebAuthn - The End of the Password As We Know It?
PDF
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
PPTX
Two factor authentication 2018
PDF
Two-factor authentication- A sample writing _Zaman
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Діана Пінчук "Як відрізнити авторизацію від аутентифікації та перестати бояти...
QA Fest 2019. Диана Пинчук. Тестирование аутентификации и авторизации (AuthN ...
Brafton White Paper Example
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Hardware Authentication
Making User Authentication More Usable
Authentifusion: Clarifying the Future of Customer Authentication
Access Control
Authentication.Next
Securing a Web App with Passwordless Web Authentication
Digital authentication
AuthN & AuthZ testing: it’s not only about the login form
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
Secure All Teh Things - Add 2 factor authentication to your own CFML projects
Web Authn & Security Keys: Unlocking the Key to Authentication
WebAuthn - The End of the Password As We Know It?
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
Two factor authentication 2018
Two-factor authentication- A sample writing _Zaman
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Ad

More from Kelley Robinson (20)

PDF
Protecting your phone verification flow from fraud & abuse
PDF
Preventing phone verification fraud (SMS pumping)
PDF
Introduction to Public Key Cryptography
PDF
Intro to SHAKEN/STIR
PDF
Building a Better Scala Community
PDF
BSides SF - Contact Center Authentication
PDF
Communication @ Startups
PDF
Contact Center Authentication
PDF
Authentication Beyond SMS
PDF
BSides PDX - Threat Modeling Authentication
PDF
SIGNAL - Practical Cryptography
PDF
Practical Cryptography
PDF
2FA, WTF!?
PDF
PDF
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
PDF
Analyzing Pwned Passwords with Spark and Scala
PDF
Practical Cryptography
PDF
Analyzing Pwned Passwords with Spark and Scala
PDF
2FA, OTP, WTF?
PDF
Forget what you think you know: Redefining functional programming for Scala
Protecting your phone verification flow from fraud & abuse
Preventing phone verification fraud (SMS pumping)
Introduction to Public Key Cryptography
Intro to SHAKEN/STIR
Building a Better Scala Community
BSides SF - Contact Center Authentication
Communication @ Startups
Contact Center Authentication
Authentication Beyond SMS
BSides PDX - Threat Modeling Authentication
SIGNAL - Practical Cryptography
Practical Cryptography
2FA, WTF!?
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark and Scala
Practical Cryptography
Analyzing Pwned Passwords with Spark and Scala
2FA, OTP, WTF?
Forget what you think you know: Redefining functional programming for Scala

Recently uploaded (20)

PPTX
Foundation to blockchain - A guide to Blockchain Tech
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPT
Project quality management in manufacturing
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Well-logging-methods_new................
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Foundation to blockchain - A guide to Blockchain Tech
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Operating System & Kernel Study Guide-1 - converted.pdf
bas. eng. economics group 4 presentation 1.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
CH1 Production IntroductoryConcepts.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Project quality management in manufacturing
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Model Code of Practice - Construction Work - 21102022 .pdf
Lecture Notes Electrical Wiring System Components
Well-logging-methods_new................
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk

Auth on the web: better authentication