SlideShare a Scribd company logo
security
keys
Paul Schreiberpaulschreiber@gmail.com
@paulschreiber
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
know
are
have
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
NIST Special
Publication
800-63BDigital Identity Guidelines
Authentication and Lifecycle Management
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
Use of the PSTN for out-of-band verification is RESTRICTED as
described in this section and in Section 5.2.10. If out-of-band
verification is to be made using the PSTN, the verifier SHALL
verify that the pre-registered telephone number being used is
associated with a specific physical device. Changing the pre-
registered telephone number is considered to be the binding of
a new authenticator and SHALL only occur as described
in Section 6.1.2.

Verifiers SHOULD consider risk indicators such as device swap,
SIM change, number porting, or other abnormal behavior before
using the PSTN to deliver an out-of-band authentication secret.
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
yubico.com/gafw/
50%
off
BigWP Security Keys
os in-browser u2f support
macOS iOS Linux Android Windows
USB ✔ ✘ ✔ ✘ ✔
Bluetooth ✘ ✔ ✘ ✔ ✘
NFC ✘ ✘ ✘ ✔ ✘
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
github.com/

Safari-FIDO-U2F/
Safari-FIDO-U2F
WebAuthn 
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
BigWP Security Keys
dongleauth.info
BigWP Security Keys
BigWP Security Keys
wordpress.org/
plugins/
two-factor/
wordpress.org/
plugins/
google-apps-
login/
BigWP Security Keys
BigWP Security Keys
SSH
BigWP Security Keys
Many graphics from The Noun Project

Computer by Azis; Credit card Gonzalo Bravo; Email by Bryn Taylor; Fingerprint by
Ben Davis; Lock with keyhole by Brennan Novak; Nokia 3310 by Stan Fisher;
Shield by Wayne Thayer; Star by Thays Malcher; Warning by Icomatic.

More Related Content

PDF
Edwards Signaling EFSC302RD Installation Manual
PDF
Ptv1000 um 14_jan10
PDF
Rad win 2000_mn_2-2
PDF
Edwards Signaling FDACT Installation Manual
PDF
Loi 11 elara fr-345-est product briefing
PDF
Manual router technicolor
PDF
H ap lite-qg
PDF
Plantronics black wire c610 c620 user guide
Edwards Signaling EFSC302RD Installation Manual
Ptv1000 um 14_jan10
Rad win 2000_mn_2-2
Edwards Signaling FDACT Installation Manual
Loi 11 elara fr-345-est product briefing
Manual router technicolor
H ap lite-qg
Plantronics black wire c610 c620 user guide

What's hot (17)

PDF
Honeywell gsmvlp5-honeywell-ilp5-install-guide
PDF
Tl wr740 n-v4_user_guide_1910010682_vn
PDF
American Fibertek RR-980C User Manual
PDF
JasonDD214Short2.PDF
PDF
Brochure Simsa Eng
PPTX
IT Lunch and Learn Final
PDF
PDF
Paxton Access 460-210-US Instruction Manual
PDF
Viking K 1900-3 - Door Entry Dialer 250 apt
PDF
Tl wr743 nd-v2_user_guide
PDF
Tl wa701 nd user guide
PDF
Edwards Signaling B-KHD-1000-PP Installation Manual
PPT
Matrix Telecom Solutions: SIMADO GFXD1111S - FCT
PDF
20109149225111
PDF
[GITSN] intelligent eavesdropping detection system
PDF
American Fibertek MX4-1000TX User Manual
Honeywell gsmvlp5-honeywell-ilp5-install-guide
Tl wr740 n-v4_user_guide_1910010682_vn
American Fibertek RR-980C User Manual
JasonDD214Short2.PDF
Brochure Simsa Eng
IT Lunch and Learn Final
Paxton Access 460-210-US Instruction Manual
Viking K 1900-3 - Door Entry Dialer 250 apt
Tl wr743 nd-v2_user_guide
Tl wa701 nd user guide
Edwards Signaling B-KHD-1000-PP Installation Manual
Matrix Telecom Solutions: SIMADO GFXD1111S - FCT
20109149225111
[GITSN] intelligent eavesdropping detection system
American Fibertek MX4-1000TX User Manual
Ad

More from Paul Schreiber (18)

PDF
Brooklyn Soloists: personal digital security
PDF
BigWP live blogs
PDF
CreativeMornings FieldTrip: information security for creative folks
PDF
WordCamp for Publishers: Security for Newsrooms
PDF
VIP Workshop: Effective Habits of Development Teams
PDF
WordPress NYC: Information Security
PDF
WPNYC: Moving your site to HTTPS
PDF
NICAR delivering the news over HTTPS
PDF
WordCamp US: Delivering the news over HTTPS
PDF
BigWP: Delivering the news over HTTPS
PDF
Delivering the news over HTTPS
PDF
Web Scraping with Python
PDF
D'oh! Avoid annoyances with Grunt.
PDF
Getting to Consistency
ZIP
Junk Mail
PDF
EqualityCamp: Lessons learned from the Obama Campaign
PDF
Mac Productivity 101
PDF
How NOT to rent a car
Brooklyn Soloists: personal digital security
BigWP live blogs
CreativeMornings FieldTrip: information security for creative folks
WordCamp for Publishers: Security for Newsrooms
VIP Workshop: Effective Habits of Development Teams
WordPress NYC: Information Security
WPNYC: Moving your site to HTTPS
NICAR delivering the news over HTTPS
WordCamp US: Delivering the news over HTTPS
BigWP: Delivering the news over HTTPS
Delivering the news over HTTPS
Web Scraping with Python
D'oh! Avoid annoyances with Grunt.
Getting to Consistency
Junk Mail
EqualityCamp: Lessons learned from the Obama Campaign
Mac Productivity 101
How NOT to rent a car
Ad

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
1. Introduction to Computer Programming.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
project resource management chapter-09.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
1. Introduction to Computer Programming.pptx
WOOl fibre morphology and structure.pdf for textiles
Encapsulation_ Review paper, used for researhc scholars
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
project resource management chapter-09.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Encapsulation theory and applications.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
DP Operators-handbook-extract for the Mautical Institute
Group 1 Presentation -Planning and Decision Making .pptx

BigWP Security Keys

  • 7. are
  • 23. NIST Special Publication 800-63BDigital Identity Guidelines Authentication and Lifecycle Management
  • 24. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 25. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 26. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 27. Use of the PSTN for out-of-band verification is RESTRICTED as described in this section and in Section 5.2.10. If out-of-band verification is to be made using the PSTN, the verifier SHALL verify that the pre-registered telephone number being used is associated with a specific physical device. Changing the pre- registered telephone number is considered to be the binding of a new authenticator and SHALL only occur as described in Section 6.1.2. Verifiers SHOULD consider risk indicators such as device swap, SIM change, number porting, or other abnormal behavior before using the PSTN to deliver an out-of-band authentication secret.
  • 36. os in-browser u2f support macOS iOS Linux Android Windows USB ✔ ✘ ✔ ✘ ✔ Bluetooth ✘ ✔ ✘ ✔ ✘ NFC ✘ ✘ ✘ ✔ ✘
  • 58. SSH
  • 60. Many graphics from The Noun Project Computer by Azis; Credit card Gonzalo Bravo; Email by Bryn Taylor; Fingerprint by Ben Davis; Lock with keyhole by Brennan Novak; Nokia 3310 by Stan Fisher; Shield by Wayne Thayer; Star by Thays Malcher; Warning by Icomatic.