03. Authentication Considerations

Authentication Considerations Heading

Authentication Considerations

ND035 C04 L01 A01.3 Authentication And Authorization

00:00
00:00

OWASP suggestions for authentication and authorization

As referenced in the above video, you can check out the OWASP authentication cheatsheet for guidelines to authentication best practices. This is a great resource to check out now, or to bookmark for later reference.

Authentication considerations

Which of the following is true with regard to authentication considerations?

SOLUTION:
  • The data used for authentication should be sufficiently random.
  • Time based token (TOTP) can be used as an authentication mechanism.