Wednesday 25th May, 2016
5:00pm to 6:00pm
Single-use codes delivered by email and SMS, mobile phone verification using automated phone calls and installed applications, or standalone physical devices—there's more than one way to perform second-factor authentication (2FA). There are benefits—and downsides—to each. Learn how each one works and what is best for you and your users. Avoid some common mistakes when rolling out 2FA and learn how you can add one or many of these methods to your application's login flow.
Bible Believer, API / Platform Guy, @lvtech Wrangler, Onetime @beckoncall, DevRel @nexmo Mercenary via @oDesk, Future Futurist, Sometime Writer & Speaker bio from Twitter
Sign in to add slides, notes or videos to this session