News Focus
News Focus
icon url

Baffic

08/16/18 1:27 PM

#206645 RE: I_Am_Ram #206642

There are many different implementation of 2FA/OOB. SFOR just owns the most secure (unless you can think of one better?).

1 = User Computer
2 = System 1 wants access to. (like a website)
3 = Security Server
4 = 2nd factor device. (cell phone)

1 and 2 can talk
2 and 3 can talk
3 and 4 can talk

1 and 3 CANNOT talk to each other
1 and 4 CANNOT talk to each other
2 and 4 CANNOT talk to each other

_____________________________________

SFOR (Full 2 Channel MF/OOB):
1 connects to 2 and enters username and password
2 contacts 3 and requests verification
3 sends request to 4
user responds on 4
4 sends confirmation to 3
3 tells 2 the user is ok
2 lets 1 into 2


Half 2 Channel MF/OOB:
1 connects to 2 and enters username and password
2 contacts 3 and requests verification
3 sends request to 4
1 responds to 2 with text from 4
2 lets 1 into 2


Full 1 Channel MF/OOB?:
1 connects to 2 and enters username and password
2 sends request to 4
1 responds to 2 with text from 4
2 lets 1 into 2


RSA Token (2 factor ONLY / No OOB):
1 connects to 2 and enters username and password
2 ask 1 for code from fob or software
1 enters code
2 lets 1 into 2