Abstract
While there is a movement to remove passwords and traditional credentials from the authentication process, and many emerging solutions are claiming to do so, the unfortunate fact for any of these technologies is still tied to the binary nature of all computing systems. You either have been authenticated, or you have not; the outcome is always Boolean. While you can apply context-aware scenarios to limit access based on other criteria to minimize risk, the user has still been authenticated with yes or no criteria.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Morey J. Haber and Brad Hibbert
About this chapter
Cite this chapter
Haber, M.J., Hibbert, B. (2018). Password Less Authentication. In: Privileged Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3048-0_4
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3048-0_4
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3047-3
Online ISBN: 978-1-4842-3048-0
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books