03. Authentication Considerations
Authentication Considerations Heading
Authentication Considerations
ND035 C04 L01 A01.3 Authentication And Authorization
OWASP suggestions for authentication and authorization
As referenced in the above video, you can check out the OWASP authentication cheatsheet for guidelines to authentication best practices. This is a great resource to check out now, or to bookmark for later reference.
Authentication considerations
SOLUTION:
- The data used for authentication should be sufficiently random.
- Time based token (TOTP) can be used as an authentication mechanism.