fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

9.9K
active users

#authn

0 posts0 participants0 posts today

Default passwords (in this case voicemail PIN) strike again! There are many #AuthN systems around that support sending OTPs by a phone call as an alternative/fallback to SMS (and is an accessibility requirement). Unfortunately, they can't account for this attack vector.
(Oh, and use Signal, not Telegram)
#Identity #Security
gbhackers.com/hackers-hijack-t

GBHackers Security | #1 Globally Trusted Cyber Security News Platform · Hackers Hijack Telegram Accounts via Default Voicemail PasswordsThe Israeli Internet Association has issued a public warning about a surge in cyberattacks targeting Telegram accounts in Israel.

Excited to be speaking at @fossasia
🚀 This year, I'm diving deep into Identity and Access Management () for .

All are welcome and I encourage all knowledge levels to attend: Don't be intimidated by "advanced security"! I'm breaking down complex concepts into easy-to-understand explanations, with a historical perspective to give context.

1️⃣Explore 🔐
2️⃣ @keycloak Primer 🌐
3️⃣Best Practices for 🛡️

Dans son guide "Recommandations relatives à l'authentification multifacteur et aux mots de passe", l'ANSSI nous explique que l'authentification forte doit mettre en oeuvre un protocole cryptographique et résister aux attaques par rejeu, et aux attaques de l'homme du milieu.... Puis s'en va nous donner des exemples d'authentification forte...

Dans cette liste, on y retrouve TOTP...

Les TOTP sont parfaitement vulnérables aux attaques par rejeu, une fois interceptés par un site de hameçonnage. Ils sont également parfaitement attaquables par MITM...

En outre, on retrouve dans la liste FIDO2.

FIDO2 est attaquable par MITM si l'on ne met pas en oeuvre la mesure dite de "channel binding" ou "token binding". À ma connaissance, cette fonctionnalité n'est prise en charge par aucun navigateur. Même Chrome l'a retiré.

groups.google.com/a/chromium.o

Ils sont beaux, les guides #ANSSI depuis quelques années... ​🥱

Edit : Cette communauté est formidable <3 Merci à toutes et tous celleux qui se sont proposé.es !

Besoin d'aide pour une relecture

J'ai rédigé ces derniers temps un cours "Identité et méthodes d'authentification" pour une grande école parisienne. Niveau Bac+5.

Ce cours sera ultérieurement publié en licence libre (probablement CC-0 ou CC-BY).

Je dois donner ce cours mercredi. Est-ce qu'un gentil ou une gentille fédinaute compétent.e ou pas sur le sujet spécifique aurait le temps de relire ce que j'ai produit ce week-end et me faire un retour ? Ca fait environ 20 pages de texte brut police 12, alinéa simple.

I'm looking for an open source #IAM provider with good recommendations... I'm considering Auth0 (out of laziness), but definitely not interested in AD or Google direct - does anyone know a good open-source tool to use for authentication? Hosting my own is fine, but rolling my own is re-inventing the wheel a bit too much.

Federation supported or not, either fine.

Some listed here: medevel.com/5-iam-enterprise/ such as #KeyCloak and #OpenIAM

MEDevel.comBest 5 Open Source Identity Management Solutions (IAM) For Enterprise for 2023Identity management is a crucial aspect of modern-day digital operations. It involves the management of user identities, access controls, and authentication in a secure and efficient manner. With the rise of cloud computing, the need for effective identity management solutions has become more apparent. This has led to the development
#Auth#Authr#Authn

that you don’t need an library like ’s fortify. Just host an AuthN provider and implement or .

If you ship a desktop app, you don’t need because the user is authenticated through their login into their computer.

If you ship to a business, they will have an LDAP or OIDC server or will host one when needed.

If you ship an app with online account, you can just host or or pay .

More below:

reddit.com/r/golang/comments/y

redditSimple web app, how to do auth?I want to write a simple web application, and need authentication. Users should be able to login via Google/Azure or via Passwords. At the...

#Passkeys question, I have Yubikeys set as the second factor on numerous accounts. What if I want to use passkey for those accounts stored on a Yubikey, will using passkey mean I need an OTP code or have to use a different Yubikey? Or will passkeys eliminate the second factor as it has seemed to do with my Google account, I just signed in using a passkey and wasn't asked for my second factor. I should have really done far more reading on this matter.
#Fido2 #authN

As we recap our fantastic talks, next up is William Brown @firstyear from @SUSE who walks us through for , showing us their ambiguities, how they work, what their limitations are, and what we need to be thinking about when we implement them.

Another fabulous talk from William.

youtube.com/watch?v=V-7zMIgGO1

I will be speaking about application security at the Azure Bootcamp Switzerland in Bern, a technology conference focusing on the Microsoft Azure Cloud. I really recommend this. Please come a say hello, would love to meet you, really looking forward.

azurebootcamp.ch/

Thanks for organizing Manuel Meyer Stefan Johner Stefan Roth

www.azurebootcamp.chTechnology conference focusing on the Microsoft Azure Cloud ☁️
#azure#iam#azuread