You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@sleevi and @rmhrisk (I believe) both raised the point that when multi-party authentication is used, it should be able to be bypassed by an attacker compromising one authentication infrastructure (for example, the LDAP server) or directly harvesting two user passwords.
Can we state that when single-factor multi-party is in use, it is limited to hardware based authentication mechanisms?
The text was updated successfully, but these errors were encountered:
@sleevi and @rmhrisk (I believe) both raised the point that when multi-party authentication is used, it should be able to be bypassed by an attacker compromising one authentication infrastructure (for example, the LDAP server) or directly harvesting two user passwords.
Can we state that when single-factor multi-party is in use, it is limited to hardware based authentication mechanisms?
The text was updated successfully, but these errors were encountered: