Fact-checked by Grok 2 weeks ago

Login

A login, also known as logon or log in, is the procedure in by which a , , or verifies their to gain authorized to a secure , such as an operating , , application, or online service, typically through the submission of credentials like a username and password. This process ensures that only legitimate users can interact with protected resources, forming the foundational step in within digital environments. The origins of login trace back to the early days of multi-user computing in the , when systems required mechanisms to isolate sessions on shared . In 1961, Fernando Corbató implemented the first password-based system as part of the (CTSS) at , allowing multiple users to access the same computer while maintaining privacy through simple credential checks. This innovation, initially designed to prevent users from viewing others' files, quickly became a standard in subsequent systems like and Unix, evolving alongside the growth of networked computing. Over time, login methods have diversified to address security vulnerabilities inherent in basic passwords, such as susceptibility to guessing or theft. Common approaches include password-based authentication, where users enter a secret string; multi-factor authentication (MFA), combining something you know (e.g., a password) with something you have (e.g., a ) or something you are (e.g., like fingerprints); and single sign-on (SSO), which allows one set of credentials to authorize access across multiple services. Emerging techniques, such as passwordless options using passkeys or FIDO2 standards, rely on to eliminate shared secrets entirely, enhancing usability and resistance to . In cybersecurity, login processes are critical for enforcing and mitigating risks like unauthorized entry, which accounts for a significant portion of breaches. Robust login implementations, including MFA adoption, can block more than 99.2% of account compromise attacks, making them essential for protecting sensitive in an era of rising cyber threats.

Fundamentals

Definition and Purpose

A login, in the context of , refers to by which a provides credentials to verify their and obtain authorized to a computer system, , or application. This mechanism establishes that the individual attempting is who they claim to be, typically by validating one or more authenticators such as shared secrets or cryptographic keys. The login serves as the initial gateway to digital resources, ensuring only legitimate users can interact with protected environments. The primary purpose of login is to enforce , thereby safeguarding sensitive information from unauthorized exposure and maintaining the integrity of systems. By verifying user identity, it prevents illicit entry that could lead to data breaches or misuse, while also facilitating personalized experiences such as tailored content, settings, or permissions based on the authenticated user's profile. Importantly, login focuses solely on —the confirmation of identity—distinct from , which occurs afterward and determines the specific permissions or resources the verified user may access. In everyday applications, login is integral to services like accounts, where users to retrieve personal messages; banking apps, enabling secure transactions; and networks, allowing employees to access internal tools. This process often involves basic components, such as entering a username and verifying it against stored records, to initiate the session.

Key Components

A login fundamentally consists of several elements that enable secure user verification and . At its heart are credentials, typically comprising a username—such as an or —and a , which collectively serve to identify and the user. These credentials are submitted by the user and processed by an authentication or mechanism, which acts as the verifier responsible for checking their validity against stored records. Upon successful verification, session management takes over, often through the issuance of or that maintain the user's authenticated state across subsequent interactions without requiring repeated credential entry. To protect credentials during storage, login systems employ hashing algorithms that transform passwords into fixed-length values using one-way functions, ensuring that the original password cannot be reversed even if the hashed data is accessed. For instance, key derivation functions like with HMAC-SHA-256, , or are used, which apply multiple iterations or computational work factors to slow down attacks, making it computationally infeasible to retrieve the input from the output. This approach, while basic, underscores the principle of non-reversibility in secure credential handling, though modern implementations often layer additional protections like salting. User interface elements are equally critical, with login forms providing the primary interaction point where users input their credentials. These forms, typically implemented as elements with secure input fields (e.g., type="[password](/page/Password)" for masking), must support features like keyboard navigation and paste functionality while allowing fields of at least 64 characters to support passphrases and align with guidelines. Error handling for invalid attempts is integrated to inform users of failures without revealing sensitive details, such as whether a username exists, thereby preserving system integrity. The operational flow of a follows a straightforward : the inputs credentials via the , the mechanism verifies them against the hashed database on the , and access is either granted—establishing a session—or denied with an appropriate . This process ensures controlled entry while minimizing exposure of underlying logic.

Authentication Methods

Password-Based Systems

Password-based systems represent the traditional cornerstone of user , where individuals provide a , typically a username, and a secret known as a to gain access to protected resources. In this process, the user submits their credentials through a login interface, and the authenticating or verifier hashes the provided —often combined with a stored —and compares it against the precomputed associated with the username in the database. If the hashes match, access is granted; otherwise, fails, ensuring that passwords are never transmitted or stored insecurely. To enhance security, password policies enforce minimum strength requirements, prioritizing length over rigid complexity rules. Organizations following NIST guidelines, for instance, mandate a minimum of eight characters for user-generated passwords, with a strong recommendation for longer passphrases up to at least 64 characters to resist brute-force attacks, while avoiding mandatory mixtures of uppercase, lowercase, numbers, and symbols that can lead to predictable patterns. These policies also incorporate blocklists to reject commonly used or compromised passwords, promoting memorable yet unique secrets without periodic forced changes unless a breach is detected. Secure storage of passwords relies on cryptographic hashing combined with salting to mitigate risks like attacks, where precomputed tables could otherwise reveal equivalents. Best practices, as outlined by , involve generating a random —a fixed-length string of random bits, at least 32 bits long—for each user's , appending or prepending it to the before applying a slow, one-way hashing function such as Argon2id, , or with a high count (e.g., 600,000 for PBKDF2-HMAC-SHA-256). The resulting salted is stored alongside the salt and algorithm parameters, allowing the server to recompute and verify the hash during login without ever retaining the original . This approach ensures that even if the database is compromised, attackers must expend significant computational resources to crack individual hashes. Despite the rise of alternative methods, password-based authentication maintains historical dominance, with 83% of organizations relying on it for at least some IT resources as of 2024.

Alternative Authentication

Alternative authentication methods provide alternatives to traditional password-based systems by leveraging factors such as inherent user traits, possession of devices or tokens, or cryptographic proofs, thereby enhancing both through reduced memorization burdens and via resistance to common attacks like and . These approaches aim to minimize user friction while maintaining robust verification, often integrating seamlessly with modern devices and protocols. Biometric authentication relies on unique physiological or behavioral traits of individuals to verify , capturing via sensors and comparing it against stored templates for . Common modalities include scanning, which analyzes minutiae points from ridge patterns on the finger; facial recognition, which maps distinctive facial features like distances between eyes and nose; and scanning, which examines the textured pattern of the iris in the eye. These methods offer high usability as they require no tokens or , but performance is measured by false acceptance rates (FAR, the probability of incorrectly accepting an imposter) and false rejection rates (FRR, the probability of denying a legitimate user), typically ranging from 0.1% to 1% in practical implementations depending on the system and environmental factors. For instance, under NIST Personal Identity Verification () standards, systems achieve FARs as low as 0.01% with FRRs up to 2%, while systems target FARs of 0.01% or lower. Biometrics improve security over passwords by binding to immutable traits, though they necessitate safeguards against spoofing like liveness detection. Token-based authentication employs "something you have" as a second factor or standalone method, generating dynamic codes or cryptographic challenges to prove possession without relying on static secrets. Hardware tokens, such as the , are physical devices that connect via USB, , or Bluetooth and support standards like FIDO2 for public-key operations or OATH-HOTP/TOTP for one-time passwords. Software tokens, exemplified by apps like , implement the (TOTP) algorithm, which uses a key and the current time to produce a 6-8 digit code valid for 30 seconds, as defined in RFC 6238. These tokens enhance security by limiting replay attacks through time- or counter-bound values and improve usability with quick generation on mobile devices, though they require secure key storage to prevent extraction. Certificate-based authentication utilizes digital certificates within a (PKI) to verify the identity of users, devices, or machines, relying on asymmetric cryptography for non-repudiable proof. In PKI, a trusted (CA) issues certificates containing a public key and identity attributes, bound to a private key held by the authenticating entity, per standards in RFC 5280. For device authentication, client certificates are provisioned to hardware or software, allowing the device to sign challenges from the server, which validates the signature against the certificate's public key and revocation status via Certificate Revocation Lists (CRLs) or (OCSP). This method bolsters security through strong cryptographic assurances and scalability in enterprise environments, while offering seamless integration for automated logins without user intervention. However, it demands robust PKI management to handle certificate lifecycle and trust chains. Passwordless options eliminate passwords entirely by using ephemeral or cryptographic mechanisms for frictionless login, prioritizing user experience and phishing resistance. Magic links send a unique, time-limited via containing an embedded token, which, when clicked, verifies the user's control over the associated inbox and grants access, typically expiring within minutes to hours. This approach enhances by simplifying entry—no codes or devices needed—and improves by avoiding credential storage, though it hinges on and requires anti-automation measures like . The standard, a W3C recommendation, enables browser-based passwordless authentication through public-key credentials, where users register a key pair with a via an (e.g., built-in or security keys), and subsequent logins involve signing a challenge with the private key. 's scoped, attested credentials ensure privacy and resist man-in-the-middle attacks, supporting diverse authenticators for broad compatibility.

Security Aspects

Common Vulnerabilities

One of the most prevalent vulnerabilities in login systems is , a social engineering attack where attackers impersonate legitimate entities to trick users into revealing credentials. Phishing often involves fraudulent websites or emails that mimic trusted services, leading to credential theft. According to the Anti-Phishing Working Group (APWG), over 1 million phishing attacks were recorded in the first quarter of 2025 alone, marking the highest number since late 2023. Closely related is , where attackers use stolen username-password pairs from previous breaches to attempt logins on other sites, exploiting users' tendency to reuse credentials. As of mid-2025, over 16 billion login credentials have been exposed and are circulating online, fueling these attacks and contributing to significant account takeovers. In recent years, infostealer has emerged as a major source of , with attackers deploying keyloggers and stealers to capture login details directly from infected devices. These tools have contributed to massive compilations of exposed credentials, including the mid-2025 incident revealing 16 billion from various services. Additionally, AI-powered attacks have increased, using generative models to create highly convincing lures tailored to individual users, heightening the risk of compromise. Brute-force attacks involve automated tools systematically trying all possible password combinations to guess credentials, while dictionary attacks target likely passwords from predefined lists of common words, phrases, or leaked data. These methods are particularly effective against weak or default passwords in login interfaces without sufficient safeguards. The Foundation describes brute-force attacks as trial-and-error attempts using scripts or bots to overwhelm login endpoints. Dictionary attacks succeed because many users select predictable passwords like "password123," as noted in analyses of common attack vectors. Man-in-the-middle (MitM) attacks occur when an interceptor positions themselves between the user and the login server, capturing transmitted credentials over unsecured channels such as HTTP or public Wi-Fi. Attackers can eavesdrop on unencrypted traffic to steal sensitive information during the authentication process. Imperva explains that MitM targets often include login credentials, enabling unauthorized access without direct guessing. This vulnerability is exacerbated in environments lacking encryption protocols like HTTPS. Session hijacking exploits post-login weaknesses by stealing or predicting session identifiers, such as or , to impersonate authenticated users and maintain unauthorized access. Attackers may use network sniffing tools on unsecured networks to capture these after a legitimate login. The OWASP Foundation highlights as a compromise of valid session tokens, often through interception or prediction, leading to full account control.

Protection Measures

To protect login processes from interception during transmission, encryption protocols such as and TLS are essential. These protocols establish secure channels that encrypt credentials, preventing man-in-the-middle (MitM) attacks where an adversary could eavesdrop or alter data in transit. SSL/TLS certificates play a critical role by verifying the server's identity, ensuring users connect to legitimate endpoints rather than imposters. Upgrading to TLS 1.2 or higher, while disabling outdated versions like SSL 3.0, further mitigates vulnerabilities such as that could expose login details. Account lockout mechanisms and CAPTCHA challenges provide robust defenses against brute-force and automated attacks on login systems. After a of failed attempts—typically limited to no more than 100 consecutive tries—accounts are temporarily locked, with durations ranging from 15 minutes to an hour, or until administrative intervention, to thwart password guessing without enabling denial-of-service abuse. Adaptive s can adjust based on risk factors, such as escalating delays after initial failures. , often deployed after 1-2 failed logins, requires users to solve human-verifiable puzzles that block bots, achieving near-100% human success rates while impeding automated scripts. These measures collectively slow down or halt credential-stuffing attempts, as recommended in security frameworks. Continuous monitoring and enable the detection of anomalous login patterns, enhancing proactive threat response. Systems analyze logs for irregularities, such as authentication requests from unfamiliar addresses or unusual geolocations, flagging deviations from established baselines that may indicate compromise or unauthorized access. Real-time tools can trigger alerts or automated blocks, supporting reauthentication intervals like every 12 hours for higher assurance levels to limit risks. Detailed of events, including timestamps and origins, aids forensic analysis while ensuring through assessments. Adherence to compliance standards like GDPR and NIST guidelines ensures login protections align with legal and technical benchmarks. Under GDPR Article 32, organizations must implement risk-appropriate measures, including for transmission and regular to safeguard integrity. NIST SP 800-63B specifies authenticator assurance levels with requirements for secure channels, , and monitoring to prevent unauthorized access. The UK's (ICO) reinforces these by mandating for logins, strong hashing for stored credentials, and anomaly monitoring to comply with data protection principles.

Advanced Features

Multi-Factor Authentication

(MFA) is an authentication system that requires more than one distinct authentication factor for successful verification, enhancing security beyond single-factor methods like passwords alone. These factors typically fall into three categories: something you know (e.g., a password or PIN), something you have (e.g., a or device), and something you are (e.g., biometric data such as fingerprints or facial recognition). By combining at least two of these, MFA reduces the risk of unauthorized access even if one factor is compromised. Common implementations of MFA include short message service (SMS) codes sent to a user's mobile device, authenticator apps that generate codes offline, and push notifications delivered to a registered app for approval. A widely adopted protocol is the Open Authentication (OATH) standard, particularly its Time-based One-Time Password (TOTP) algorithm, which produces a 6- or 8-digit code valid for a short period, typically 30 seconds, based on a shared secret key and the current time. TOTP is implemented in apps like Google Authenticator and supports seamless integration with login systems without relying on network connectivity for code generation. Adoption of MFA surged following disclosures of major data breaches in 2016, such as the incident that exposed over 1 billion user accounts, highlighting the vulnerabilities of password-only systems and prompting services to implement layered protections. Usage of MFA increased by more than 40% that year, driven by heightened awareness of credential theft risks. As of 2025, the global MFA market is estimated at approximately $21.3 billion (projected from 2023 data at $16.31 billion with a 14.2% CAGR), reflecting broad integration across enterprises, with adoption rates around 87% in very large organizations (over 10,000 employees) and 34% in small to medium-sized businesses (26-100 employees). Despite its benefits, MFA introduces user friction through additional verification steps, which can lead to fatigue or abandonment during login processes. SMS-based methods are particularly susceptible to SIM-swapping attacks, where attackers convince mobile carriers to transfer a victim's phone number to a new SIM card, intercepting codes and bypassing the "something you have" factor. To mitigate these risks, hardware security keys such as YubiKey provide phishing-resistant authentication using standards like FIDO2, requiring physical possession and cryptographic proof without reliance on SMS or easily phishable elements.

Single Sign-On

Single Sign-On (SSO) enables users to authenticate once with a single set of credentials and gain access to multiple affiliated applications or services without re-entering login information. This centralized authentication process relies on an (IdP) that verifies the 's identity and issues tokens or assertions to service providers (SPs), allowing seamless access across domains. For example, a logging into a can immediately access services like and using the same credentials. Key protocols underpin SSO implementations, tailored to different environments. In enterprise settings, (SAML) 2.0 serves as an XML-based standard for exchanging and data between an and , facilitating management through signed assertions and metadata. For web-based applications, OAuth 2.0 provides an framework that supports token exchange flows, where an issued by an server grants delegated access to protected resources without sharing user credentials. Building on OAuth 2.0, OpenID Connect adds an layer by issuing ID tokens, typically JSON Web Tokens (JWTs), to verify user identity and enable SSO across relying parties. SSO offers significant benefits, including reduced , as users manage fewer credentials, leading to improved productivity and lower support costs for password resets. However, it introduces risks such as a , where a compromise of the central could grant attackers broad access to connected systems. An example of in practice is (formerly Azure AD), which uses protocols like SAML or Connect to establish trust across organizational boundaries, allowing users to access cloud and on-premises resources with one login. Implementing SSO presents challenges, particularly in establishing and maintaining trust relationships between IdPs and SPs. Trust is typically built through the exchange of metadata documents containing public keys, endpoints, and entity identifiers, with assertions signed using XML Digital Signatures to ensure integrity and authenticity. Misconfigurations in these relationships can lead to vulnerabilities, such as unauthorized assertion acceptance, requiring careful configuration of conditions like audience restrictions and not-on-or-after timestamps. SSO often leverages session tokens from the initial authentication to maintain state across services, but these must be securely managed to prevent replay attacks.

Historical Development

Origins and Evolution

The origins of login systems trace back to the early 1960s, when multi-user computing environments required mechanisms to identify and authenticate users for shared access to mainframe resources. The (CTSS), implemented in 1961 at under Fernando Corbató, introduced the first password-based , allowing multiple users to access the system while protecting files with simple credential checks. This addressed the need for privacy in setups. Building on CTSS, the operating system, developed starting in 1964 as a collaborative project between MIT's Project , Bell , and , introduced one of the earliest formalized login procedures, including user IDs and passwords to establish secure multi-user sessions on the GE-645 mainframe. This innovation addressed the limitations of single-user batch processing by enabling , where multiple users could interact with the system simultaneously while maintaining isolation through . In the 1970s, login mechanisms evolved with the advent of Unix, which formalized password-based authentication in its system files. Early versions of Unix, such as the Third Edition released in , stored user credentials in the /etc/passwd file, initially in plaintext before adopting one-way hashing to enhance security against unauthorized access. This approach became a foundational standard for systems, influencing subsequent operating systems by integrating login as a core component of user account management and resource allocation. By the 1990s, the rise of the web prompted adaptations for networked environments, with HTTP Basic Authentication emerging in 1993 as a simple method for protecting web resources using base64-encoded credentials transmitted over HTTP. This protocol, formalized in the HTTP 1.0 specification in 1996, enabled the first widespread web logins but highlighted the need for due to its vulnerability to . Key developments in the late 1990s and 2000s further refined login security and usability. introduced the Secure Sockets Layer (SSL) protocol in 1994 to encrypt communications, including login credentials, thereby establishing a secure channel for web-based that became essential for and online services. The 2000s saw a shift toward dynamic interfaces with the adoption of Asynchronous JavaScript and XML (AJAX) techniques around 2005, allowing login forms to validate credentials without full page reloads, improving user experience in web applications like and early social platforms. High-profile breaches, such as the 2000 AOL incident where a exploited employee accounts to from approximately 200 member accounts, accelerated the adoption of stricter access controls and monitoring practices across the industry. Post-2010, the proliferation of smartphones and drove innovations in login systems tailored to mobile and distributed environments. The widespread use of and devices from 2010 onward necessitated touch-based and biometric integrations, while cloud platforms like AWS and popularized federated models, enabling seamless access across devices and services. These advancements built on earlier foundations, emphasizing and cross-platform compatibility in an era of ubiquitous connectivity.

Etymology and Terminology

The term "login" originated in the early within , as a contraction of the phrase "log in," referring to the act of recording a user's entry into a computer system to establish access. This usage first appeared in documentation for the (CTSS) at , where a 1963 programmer's guide defined it as "to open one’s on-line access to a computer." The phrase drew from the nautical tradition of "logging" entries in a ship's to record events, a practice dating back to at least 1689, adapted here to track user sessions in multi-user environments. Related terms emerged as synonyms with contextual variations. "Logon," often used interchangeably, became prominent in Microsoft Windows environments starting from the 1980s, emphasizing the process of authenticating and initializing a user session on the operating system. In contrast, "sign-in" gained favor in consumer-facing web applications for its approachable tone, while "login" retained a more technical connotation in system-level or contexts. The terminology evolved alongside paradigms, shifting from "sign-on" in systems of the 1950s—where users submitted jobs without interactive access—to "login" in the interactive systems of the , such as CTSS and . This change reflected the need for real-time user identification in shared resources. The development of in 1969 further influenced standardization, as early network protocols incorporated login procedures for remote access, exemplified by the system's first attempted message of "LOGIN" between UCLA and Stanford. Culturally, adaptations appear in non-English systems; for instance, German computing interfaces often use "anmelden," meaning "to announce" or "register," to denote logging in, highlighting localized linguistic preferences in user interfaces.

References

  1. [1]
    What is a logon (or login)? | Definition from TechTarget
    Jun 9, 2023 · In computing, a logon is a procedure that enables an entity to access a secure system such as an operating system, application, service, ...
  2. [2]
    Windows Logon Scenarios - Microsoft Learn
    Jul 8, 2025 · Windows operating systems require all users to log on to the computer with a valid account to access local and network resources.
  3. [3]
    The Unofficial History of Passwords | Microsoft Surface
    Apr 16, 2024 · Computer scientist Fernando Corbató developed the Compatible Time-Sharing System (CTSS), which allowed multiple users to share a computer's ...
  4. [4]
    A short history of the computer password - WeLiveSecurity
    May 4, 2017 · The modern computer password was introduced to computer science and the wider world in 1960 by Fernando Corbató. We look at its history and impact.
  5. [5]
    Authentication methods: choosing the right type
    Why go 'beyond passwords'? Multi-factor authentication (MFA); Federated Single Sign-On (SSO) services; FIDO2; Magic links and one time passwords (OTPs).
  6. [6]
    Authentication methods and features - Microsoft Entra ID
    Mar 4, 2025 · Microsoft recommends passwordless authentication methods such as Windows Hello, Passkeys (FIDO2), and the Microsoft Authenticator app ...Manage authentication · Certificate-based authentication · Software OATH tokens
  7. [7]
    Why is Strong Authentication Important? - SentinelOne
    Apr 12, 2023 · Strong authentication is crucial for protecting against cyber attacks, particularly those that rely on stolen credentials.What Is Authentication? · How Cyber Attackers Bypass... · How To Defend Against Mfa...
  8. [8]
    Multifactor Authentication | Cybersecurity and Infrastructure ... - CISA
    MFA prevents unauthorized access to your data and applications by requiring a second method of verifying your identity, making you much more secure.
  9. [9]
    NIST Special Publication 800-63-3
    Authentication establishes that a subject attempting to access a digital service is in control of the technologies used to authenticate. Successful ...
  10. [10]
    authentication - Glossary - NIST Computer Security Resource Center
    Authentication is verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.
  11. [11]
    Identification and Authentication (IA) - CMS Information Security
    Identification and Authentication (IA) is a technical measure that prevents unauthorized access to computer systems by verifying the identity of users and ...
  12. [12]
    What is a user authentication policy? - SailPoint
    Mar 15, 2024 · User authentication safeguards sensitive data, aids in regulatory compliance, and enables personalized access to resources. User authentication ...
  13. [13]
    Authentication vs Authorization: Key Differences - Fortinet
    Authentication is the process of verifying user identity before giving them permission to access a system, account, or file. Its main purpose is to verify (“ ...Missing: science | Show results with:science
  14. [14]
    Authentication - OWASP Cheat Sheet Series
    While authentication through a combination of username, password, and multi-factor authentication is considered generally secure, there are use cases where it ...
  15. [15]
    NIST Special Publication 800-63B
    Authentication is the process of determining the validity of one or more authenticators used to claim a digital identity by establishing that a subject ...
  16. [16]
    Session Management - OWASP Cheat Sheet Series
    ### Summary of Session Management in Login Systems (Post-Login Tokens/Cookies)
  17. [17]
    Password Storage - OWASP Cheat Sheet Series
    ### Summary of Hashing Algorithms for Password Storage
  18. [18]
  19. [19]
    2025 Multi-Factor Authentication (MFA) Statistics & Trends to Know
    Jan 3, 2025 · JumpCloud's 2024 IT Trends Report found that 83% of organizations use password-based authentication for some IT resources, 83% also require MFA ...
  20. [20]
    [PDF] Biometric Specifications for Personal Identity Verification
    ... authentication attempt, then false acceptance rates will typically be twice the calibrated value. However, if a system is configured to always or.
  21. [21]
    Web Authentication: An API for accessing Public Key Credentials
    Apr 8, 2021 · This specification defines an API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications.
  22. [22]
    RFC 6238 - TOTP: Time-Based One-Time Password Algorithm
    This document describes an extension of the One-Time Password (OTP) algorithm, namely the HMAC-based One-Time Password (HOTP) algorithm, as defined in RFC 4226.
  23. [23]
    YubiKeys | Two-Factor Authentication for Secure Login
    The Yubico Authenticator app allows you to store your credentials on a YubiKey and not on your mobile phone, so that your secrets cannot be compromised.YubiKey 5 Series · Yubico Authenticator · YubiKey Bio Series · YubiKey 5C NFC
  24. [24]
    RFC 5280 - Internet X.509 Public Key Infrastructure Certificate and ...
    RFC 5280 profiles X.509 v3 certificates and X.509 v2 CRLs for the Internet, part of the Internet PKI standards, and describes certification path processing.
  25. [25]
    What is Certificate-Based Authentication | Yubico
    Certificate-based authentication uses digital certificates to securely identify devices, users, or machines before granting access to resources.
  26. [26]
    What Are Magic Links and How Do They Work? - Descope
    Mar 28, 2025 · Magic links are a passwordless authentication method using URLs with unique and time-limited embedded tokens to verify a user's identity during the login ...How magic link authentication... · Common uses of magic links
  27. [27]
    Phishing Activity Trends Report - APWG
    In Q1 2025, 1,003,924 phishing attacks were observed, the largest since late 2023. Financial attacks grew, and wire transfer BEC attacks increased by 33%. QR ...
  28. [28]
    Business guide for credential-stuffing attacks | New York State ...
    According to a recent study, there are more than 15 billion stolen credentials circulating on the Internet. This enormous cache of credentials has fueled a ...
  29. [29]
    Vulnerabilities in password-based login | Web Security Academy
    A brute-force attack is when an attacker uses a system of trial and error to guess valid user credentials. These attacks are typically automated using wordlists ...
  30. [30]
    Brute-Force and Dictionary Attacks: Prevention - Rapid7
    Brute-force and dictionary attacks use automated methods to crack passwords. Learn how they work and explore best practices to prevent unauthorized access.
  31. [31]
    What is MITM (Man in the Middle) Attack | Imperva
    The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users ...What Is Mitm Attack · Mitm Attack Progression · Interception
  32. [32]
    Session hijacking attack - OWASP Foundation
    The Session Hijacking attack compromises the session token by stealing or predicting a valid session token to gain unauthorized access to the Web Server.
  33. [33]
    Hackers raid eBay in historic breach, access 145M records - CNBC
    May 22, 2014 · EBay said that hackers raided its network three months ago, accessing some 145 million user records in what is poised to go down as one of the biggest data ...
  34. [34]
    Securing End-to-End Communications | CISA
    Sep 29, 2016 · Generally, encryption and digital certificates provide an effective safeguard against MITM attacks, assuring both the confidentiality and ...
  35. [35]
    NIST Special Publication 800-63B
    This document provides recommendations on types of authentication processes, including choices of authenticators, that may be used at various Authenticator ...
  36. [36]
    Blocking Brute Force Attacks - OWASP Foundation
    The most obvious way to block brute-force attacks is to simply lock out accounts after a defined number of incorrect password attempts.<|separator|>
  37. [37]
    What Is Anomaly Detection? - CrowdStrike
    Sep 9, 2024 · Anomaly detection is the process of analyzing a dataset and identifying single occurrences or patterns that deviate significantly from baseline activity.
  38. [38]
    Art. 32 GDPR – Security of processing - General Data Protection ...
    Rating 4.6 (10,110) The controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk.
  39. [39]
    Passwords in online services | ICO
    Although the UK GDPR does not say anything specific about passwords, you are required to process personal data securely by means of appropriate technical and ...
  40. [40]
    multi-factor authentication - Glossary | CSRC
    Definitions: The means used to confirm the identity of a user, process, or device (e.g., user password or token).
  41. [41]
    Multi-Factor Authentication | NIST
    Jan 10, 2022 · MFA is an important security enhancement that requires a user to verify their identity by providing more than just a username and password.
  42. [42]
    The Biggest and Most Impactful Data Breaches of 2016
    Jan 19, 2017 · The Biggest and Most Impactful Data Breaches of 2016 · Yahoo! Data Breach · FriendFinder Networks Data Breach · Myspace Data Breach · LinkedIn Data ...
  43. [43]
    Multi-Factor Authentication Sees Huge 40% Jump in 2016
    Dec 19, 2016 · The use of multi-factor authentication (MFA) has jumped by more than 40% year-over-year in 2016. According to a survey from SecureAuth Corp.Missing: major | Show results with:major
  44. [44]
    Multi-Factor Authentication (MFA) Statistics You Need To Know In ...
    Jul 14, 2025 · According to JumpCloud, 87% of companies with over 10,000 employees use MFA, and SMBs trended towards an MFA adoption rate of around 34% or less ...
  45. [45]
    The Pros and Cons of Different MFA Methods - Keeper Security
    Mar 31, 2025 · Cons. 1. Vulnerable to SIM swapping: An attacker can convince a user's mobile carrier to transfer the user's phone number to a new SIM card ...
  46. [46]
    MFA & SIM Swapping: How to Strengthen Security - Double Octopus
    May 29, 2023 · SIM swapping weaponizes MFA. Most 2FA and MFA deployments involve the use of one-time passcodes (OTPs) texted to a user's mobile phone, or sent ...
  47. [47]
    What is Single Sign-On (SSO)? Definition, How It Works & Benefits
    Jun 25, 2025 · SSO is a session and user authentication service that lets users access multiple applications or systems with a single set of login credentials.
  48. [48]
    What is single sign-on? - Microsoft Entra ID
    Sep 30, 2024 · Federation - When you set up SSO to work between multiple identity providers, it's called federation. An SSO implementation based on federation ...
  49. [49]
    Use your Google Account for YouTube
    To sign in, enter the email address you used for those products. For example, if you use Gmail, it's your Gmail username. If you don't have a Google Account, ...Missing: single | Show results with:single
  50. [50]
    None
    Summary of each segment:
  51. [51]
    OAuth 2.0 — OAuth
    ### Summary of OAuth 2.0 Role in SSO, Especially Token Exchange
  52. [52]
  53. [53]
    SSO Implementation: Key Steps, Benefits & Best Practices - Reco AI
    Sep 11, 2025 · SSO Reduces Password Fatigue and Centralizes Authentication: Single sign-on enables users to access multiple applications with one login, ...
  54. [54]
    How To Prevent Password Fatigue - Keeper Security
    May 6, 2024 · 4 ways to prevent password fatigue · Invest in a password manager · Use strong passphrases · Deploy Single Sign-On (SSO) · Implement passwordless ...
  55. [55]
    What is federation with Microsoft Entra ID?
    Apr 9, 2025 · You can federate your on-premises environment with Microsoft Entra ID and use this federation for authentication and authorization. This sign-in ...
  56. [56]
    SAML Security - OWASP Cheat Sheet Series
    Their SSO profile was vulnerable to a Man-in-the-middle attack from a malicious SP (Service Provider). The SSO Web Browser Profile is most susceptible to ...
  57. [57]
  58. [58]
    History - Multics
    Jul 31, 2025 · Multics design was started in 1965 as a joint project by MIT's Project MAC, Bell Telephone Laboratories, and General Electric Company's Large ...
  59. [59]
    The First Secure Sockets Layer - UT Computer Science
    A brief history of the first secure sockets layer (Wikipedia version). In ... We articulated the case for secure sockets in a paper presented on June 8, 1994 at ...
  60. [60]
    A Brief History of Ajax - Aaron Swartz
    Dec 22, 2005 · During the first big stretch of browser innovation, Netscape added a feature known as LiveScript, which allowed people to put small scripts in ...
  61. [61]
    After Attack by Hackers, AOL Tightens Data Access
    Jun 19, 2000 · America Online plans steps to fix flaws in its network that let hackers get access to personal data about some members last week; ...
  62. [62]
    The secret origin of “log in” | Designcult
    Aug 5, 2011 · It was 2 words “b…..” and “log”. Maybe in terms of the time-sharing system, the reason to use the term “login” is not so much to mean “entering ...
  63. [63]
  64. [64]
    17 Examples of Login Page Design & Best Practices | AGENTE
    Mar 14, 2018 · “Log in” is believed to be more technical, while “sign in ... The login page allows a user to access a website or web application ...
  65. [65]