DEV Community

Web Authentication For Actual Humans, Part One

Greg Hardin on September 08, 2018

So you’re building an application and have just realized you want to allow your users to login. You’re not sure that you know how to handle this ...
Collapse
 
jazkh profile image
jazkh • Edited

Token = Weak security.
Token + SSL = Medium security.
Token + SSL + 2 factor Auth = High security.

If there is some malicious program running in your PC such as a keylogger then no strategy will make you secure other than using some popular AntiVirus.

Collapse
 
andrewgwallace profile image
Andrew Wallace

Where's Part 2 and beyond? :)

Collapse
 
ghardin137 profile image
Greg Hardin

It’s coming. Part 2 is much longer, so it’s taking longer to write.

Collapse
 
ghardin137 profile image
Greg Hardin

Life got in the way, but here's part 2 finally dev.to/ghardin137/web-authenticati...

Collapse
 
chiangs profile image
Stephen Chiang

Hey this is a great topic to write about and a great and fun analogy to use!

Collapse
 
ghardin137 profile image
Greg Hardin

That's a great question. That's definitely one vulnerability of using token systems. I'll be explaining this and more in the next installment in the series.