03. Authentication Considerations

Authentication Considerations Heading

Authentication Considerations

ND035 C04 L01 A01.3 Authentication And Authorization

OWASP suggestions for authentication and authorization

As referenced in the above video, you can check out the OWASP authentication cheatsheet for guidelines to authentication best practices. This is a great resource to check out now, or to bookmark for later reference.

Authentication considerations

Which of the following is true with regard to authentication considerations?

SOLUTION:
  • The data used for authentication should be sufficiently random.
  • Time based token (TOTP) can be used as an authentication mechanism.