Skip to main content

Password Less Authentication

  • Chapter
  • First Online:
Privileged Attack Vectors
  • 1455 Accesses

Abstract

While there is a movement to remove passwords and traditional credentials from the authentication process, and many emerging solutions are claiming to do so, the unfortunate fact for any of these technologies is still tied to the binary nature of all computing systems. You either have been authenticated, or you have not; the outcome is always Boolean. While you can apply context-aware scenarios to limit access based on other criteria to minimize risk, the user has still been authenticated with yes or no criteria.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 19.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Morey J. Haber and Brad Hibbert

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Haber, M.J., Hibbert, B. (2018). Password Less Authentication. In: Privileged Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3048-0_4

Download citation

Publish with us

Policies and ethics