Book Overview
Multifactor authentication has emerged as one of the best ways to tackle the global cybersecurity concerns in recent years, but choosing the wrong MFA solution for your needs can do more harm than good.
Implementing Multifactor Authentication will show you how to choose, deploy, and troubleshoot multiple authentication methods in your applications to make them safer without compromising the user experience.
You’ll start with an introduction to authentication and explain how MFA comes into the picture along with understanding why it is important. You will learn how MFA works and the types currently available on the market. As you progress through the chapters, you will learn how to choose the right MFA set up to keep the user experience as friendly as possible. You’ll also explore different ways how hackers bypass MFA and how to protect your applications from these attacks.
Next, you’ll delve into how MFA helps mitigate cyber threats, cover best practices, and real-world scenarios. You’ll also learn how to enable and manage the MFA model in public clouds like AWS, Azure, and GCP, how biometrics fits into the equation, and what the next wave of innovation might bring.
By the end of this book, you will understand how to secure MFA solutions and how your organization can protect itself from MFA hacking.
What you will learn
- Understand the benefits and shortcomings of MFA methods in use today
- Choose the best MFA product or solution for your security needs
- Deploy and configure your chosen solution to get the most out of it
- Identify problems with different MFA solutions and learn how to solve or mitigate them
- Reduce UX friction with ForgeRock and behavioral biometrics
- Learn about future technologies in the field and what to look for next
Who This Book Is For
This book is for developers, system administrators, security professionals, white-hat hackers, pentesters, CISOs, or anyone interested in understanding the technology and creating or improving their access management authentication infrastructure. Basic knowledge of authentication and identity management will help you get the most out of this book, but it’s not a prerequisite if you’re willing to do a bit of side research on the technical terms.
Table of Contents
- On the Internet, Nobody Knows You’re a Dog – What Is Authentication
- When to Use Different Types of MFA
- Preventing 99.9% of Attacks to Your Workforce Accounts
- Implementing Customer Authentication Using Okta and HYPR
- Passwordless Workforce Authentication Using PingFederate and 1Kosmos
- Reducing MFA Friction with ForgeRock and Behavioral Biometrics
- MFA and the Cloud – Using MFA with AWS and Google Cloud
- MFA without Commercial Products – Doing it All Yourself with Keycloak
- When MFA Is Not Enough
- Best Practices and Tips for a Successful MFA Implementation
- What Is Coming to Improve (Multi-Factor) Authentication