SlideShare a Scribd company logo
Making

User Authentication

More Usable
Jim Fenton

@jimfenton
Context
I’m a consultant to the National Institute of Standards
and Technology
Focusing on revising US Government digital identity
standards
Everything here is my own opinion; I don’t speak for
NIST!
This talk focuses on the usability aspects of
authentication, and the security aspects only incidentally
About SP 800-63
NIST Special Publication
800-63, Digital Identity
Guidelines
Intended for federal
government use, but
also widely used
commercially and
internationally
Four-volume Set
Enrollment and

Identity Proofing

SP 800-63A
Authentication and

Lifecycle Management

SP 800-63B
Federation and Assertions

SP 800-63C
Executive Order 13681, “Improving the Security

of Consumer Financial Transactions”
“…ensure that all agencies making personal data
accessible to citizens through digital applications
require the use of multiple factors of authentication
and an effective identity proofing process, as
appropriate.”
Who are the Users?
Everybody:
Non-English speakers
Homeless people
Disabled veterans
Hospital patients
Physicians
Elderly
Students
Usability needs to consider all of these
Not just Federal employees!
Photo by Rob Curran on Unsplash
Usability Emphasis in

SP 800-63-3
Engaged NIST human-factors specialists
Included a Usability Considerations section in each
volume (A, B, and C)
Invited review on normative requirements that might
affect usability
Related Concepts
Accessibility: Can users with various disabilities
authenticate?
Availability: Can users authenticate under all
circumstances?
Authenticators
Nine authenticator types defined
Memorized secret (password, PIN, etc.)
Look-up secret
Out-of-band device
Single- and multi-factor OTP device
Single- and multi-factor crypto software
Single- and multi-factor crypto device
Factors
There are three authentication factors:
Something you know (password)
Something you have
Something you are (biometric)
Authenticators may provide 1 or 2 of these
Memorized Secrets
Passwords, passphrases, PINs, etc.
Memorized Secrets
Passwords are:
Most used authenticators
Most hated authenticators
Relatively weak
But they’re the only “something you know”
Security questions no longer acceptable
Making Passwords More
Usable
Action Rationale
Get rid of composition rules
(include digits, symbols, etc.)
Frustrating for users, less
benefit than expected
Allow all printing characters
plus space
Maximum freedom in selection;
no technical reason otherwise
Allow Unicode characters
Memorable passwords in all
languages
Very long maximum length
Encourage long passwords,
passphrases
Frustration vs. Security
Recommend use of a blacklist for common passwords
Unfortunately not very transparent
Frustrated users make bad choices
Weak
passwords
allowed
Frustrated
users
Blacklist size
Password Visibility
Passwords are obscured to
inhibit “shoulder surfing”
Makes correct entry more
difficult, and often there is no
shoulder-surfing threat
Recommend making
passwords visible on
request
Future browser feature??
Pasting
Some sites disallow pasting:
<input type="test" onPaste="return false”>
Also disables password managers
Done to enhance security, but probably encourages
weaker passwords
SP 800-63B discourages blocking pasting
Other Authenticators
Look-up Secrets
List of machine-generated
one-time secrets
Not intended for memorization:
typically more complex
Less usable/accessible
because they require manual
transcription, subject to
misread/mistyping
Cheap and very suitable as a
backup authenticator
Out-of-Band
Requires a separate
communication channel,
usually separate device
Availability: cell phone
service is not always
available
Accessibility: Usually
requires transcription of a
secret from one device to
another, often time-limited
Single-factor One Time
Password (OTP)
Requires transcription
from device to login
session
Time based OTP
imposes a time limit on
this process
Photo credit: Wikimedia Commons
Multi-factor OTP
Requires transcription of
secret from
authenticator to login
session
Typing on small device
may be challenging
Photo credit: HID
Cryptographic Software
Authenticators
Example: client certificate (with or without passphrase)
Process for installation of authenticator on user device
should be considered
Authenticators need to be organized for identification
Single-factor

Cryptographic Device
Availability: Requires an
interface (e.g., USB) to
connect to
authenticating device
Location of some ports
is inconvenient for
pushing the button
Photo credit: Yubico
Multi-factor
Cryptographic Device
Availability: Requires an
interface or adapter to
connect to
authenticating device
About Biometrics…
Need to reproduce conditions of enrollment
Choice of finger (fingerprint)
Lighting conditions (iris)
Facial hair, expression, glasses (face)
Many modalities (fingerprint, iris, etc.) are not usable by some
people
Generally considered convenient to use, but familiarity is important
Summary
There isn’t a perfect authenticator, from either a
usability or security standpoint
Services should support a variety of ways to
authenticate and to enroll multiple authenticators per
user
Identity Proofing
Identity Proofing
Enrollment process: establishing that a digital identity
corresponds to a specific individual
Generally done only once at enrollment, but may be
repeated if all authenticators are lost
May be done in-person (preferred) or remotely
Less sensitive to convenience, but more sensitive to
accessibility (disabled, homeless, etc.)
Questions?

More Related Content

What's hot (20)

PPSX
Shoulder surfing resistant graphical and image based login system
Akshay Surve
 
PDF
Comptia Security+ Exam Notes
Vijayanand Yadla
 
PPTX
Two factor authentication presentation mcit
mmubashirkhan
 
PPTX
captcha as a graphical password
VishnuVardhan mooli
 
PPT
Penetration Testing Basics
Rick Wanner
 
PPTX
User authentication
CAS
 
PPTX
Webinar - Easy multi factor authentication strategies and PCI DSS
onionid12
 
PPTX
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 
PPTX
Two Factor Authentication Made Easy ICWE 2015
Alex Q. Chen
 
PDF
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd Iaetsd
 
PPTX
Mobile security services 2012
Tjylen Veselyj
 
DOCX
Vshantaram
sparsh dwivedi
 
RTF
Graphical password minor report
Love Kothari
 
PDF
Penetration and hacking training brief
Bill Nelson
 
PDF
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
 
DOCX
Engineering Project of Venkata Krishna
banda5630
 
PDF
ECSA Exam Centre in Adyar
sasikalaD3
 
PPTX
Authentication scheme for session password using Images and color
Nitesh Kumar
 
PDF
1208 wp-two-factor-and-swivel-whitepaper
Hai Nguyen
 
PPT
Electronic Authentication More Than Just A Password
Nicholas Davis
 
Shoulder surfing resistant graphical and image based login system
Akshay Surve
 
Comptia Security+ Exam Notes
Vijayanand Yadla
 
Two factor authentication presentation mcit
mmubashirkhan
 
captcha as a graphical password
VishnuVardhan mooli
 
Penetration Testing Basics
Rick Wanner
 
User authentication
CAS
 
Webinar - Easy multi factor authentication strategies and PCI DSS
onionid12
 
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 
Two Factor Authentication Made Easy ICWE 2015
Alex Q. Chen
 
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd Iaetsd
 
Mobile security services 2012
Tjylen Veselyj
 
Vshantaram
sparsh dwivedi
 
Graphical password minor report
Love Kothari
 
Penetration and hacking training brief
Bill Nelson
 
Pass byo bring your own picture for securing graphical passwords
LeMeniz Infotech
 
Engineering Project of Venkata Krishna
banda5630
 
ECSA Exam Centre in Adyar
sasikalaD3
 
Authentication scheme for session password using Images and color
Nitesh Kumar
 
1208 wp-two-factor-and-swivel-whitepaper
Hai Nguyen
 
Electronic Authentication More Than Just A Password
Nicholas Davis
 

Similar to Making User Authentication More Usable (20)

PDF
Three Step Multifactor Authentication Systems for Modern Security
ijtsrd
 
PDF
Two-factor authentication- A sample writing _Zaman
Asad Zaman
 
PDF
Class paper final
Anusha Manchala
 
PPT
BSI Biometrics Standards Presentation
BSI British Standards Institution
 
PDF
Brafton White Paper Example
Kayla Perry
 
PPS
Ranjith_Bm
branjith
 
PPT
5 Standards And Recommendations For Information Security On Internet
Ana Meskovska
 
PDF
Multi Factor Authentication Whitepaper Arx - Intellect Design
Rajat Jain
 
PPT
Biometrics and authentication webinar v3
DigitalPersona
 
PDF
UNIT 2 Information Security Sharad Institute
SatishPise4
 
PDF
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
Artur Barseghyan
 
PDF
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
ensuritytech1
 
PDF
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
 
PDF
120 i143
Hai Nguyen
 
PPT
Ynamono Hs Lecture
ynamoto
 
PPTX
Biometrics security
Vuda Sreenivasarao
 
PDF
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
 
PPT
1.Security Overview And Patching
phanleson
 
PDF
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
tonkung6
 
PDF
Biometric System and Recognition Authentication and Security Issues
ijtsrd
 
Three Step Multifactor Authentication Systems for Modern Security
ijtsrd
 
Two-factor authentication- A sample writing _Zaman
Asad Zaman
 
Class paper final
Anusha Manchala
 
BSI Biometrics Standards Presentation
BSI British Standards Institution
 
Brafton White Paper Example
Kayla Perry
 
Ranjith_Bm
branjith
 
5 Standards And Recommendations For Information Security On Internet
Ana Meskovska
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Rajat Jain
 
Biometrics and authentication webinar v3
DigitalPersona
 
UNIT 2 Information Security Sharad Institute
SatishPise4
 
SSO using CAS + two-factor authentication (PyGrunn 2014 talk)
Artur Barseghyan
 
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
ensuritytech1
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
 
120 i143
Hai Nguyen
 
Ynamono Hs Lecture
ynamoto
 
Biometrics security
Vuda Sreenivasarao
 
IRJET- Password Management Kit for Secure Authentication
IRJET Journal
 
1.Security Overview And Patching
phanleson
 
AnevaluationofsecurestorageofauthenticationdataIJISR.pdf
tonkung6
 
Biometric System and Recognition Authentication and Security Issues
ijtsrd
 
Ad

More from Jim Fenton (10)

PDF
Notifs 2018
Jim Fenton
 
PPTX
REQUIRETLS: Sender Control of TLS Requirements
Jim Fenton
 
PDF
Security Questions Considered Harmful
Jim Fenton
 
PDF
LOA Alternatives - A Modest Proposal
Jim Fenton
 
PDF
Notifs update
Jim Fenton
 
PDF
IgnitePII2014 Nōtifs
Jim Fenton
 
PDF
iBeacons: Security and Privacy?
Jim Fenton
 
PPTX
OneID Garage Door
Jim Fenton
 
PDF
Identity systems
Jim Fenton
 
PPTX
Adapting Levels of Assurance for NSTIC
Jim Fenton
 
Notifs 2018
Jim Fenton
 
REQUIRETLS: Sender Control of TLS Requirements
Jim Fenton
 
Security Questions Considered Harmful
Jim Fenton
 
LOA Alternatives - A Modest Proposal
Jim Fenton
 
Notifs update
Jim Fenton
 
IgnitePII2014 Nōtifs
Jim Fenton
 
iBeacons: Security and Privacy?
Jim Fenton
 
OneID Garage Door
Jim Fenton
 
Identity systems
Jim Fenton
 
Adapting Levels of Assurance for NSTIC
Jim Fenton
 
Ad

Recently uploaded (20)

PPTX
L1A Season 1 ENGLISH made by A hegy fixed
toszolder91
 
PPT
introductio to computers by arthur janry
RamananMuthukrishnan
 
PPTX
Presentation3gsgsgsgsdfgadgsfgfgsfgagsfgsfgzfdgsdgs.pptx
SUB03
 
PPTX
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
PDF
Web Hosting for Shopify WooCommerce etc.
Harry_Phoneix Harry_Phoneix
 
PDF
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
PPTX
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
PPTX
PE introd.pptxfrgfgfdgfdgfgrtretrt44t444
nepmithibai2024
 
PPTX
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
PPTX
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
PDF
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
PPTX
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
PPTX
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
PPT
Agilent Optoelectronic Solutions for Mobile Application
andreashenniger2
 
PPTX
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
PDF
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
PPTX
Orchestrating things in Angular application
Peter Abraham
 
PPTX
Lec15_Mutability Immutability-converted.pptx
khanjahanzaib1
 
PPT
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
PDF
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 
L1A Season 1 ENGLISH made by A hegy fixed
toszolder91
 
introductio to computers by arthur janry
RamananMuthukrishnan
 
Presentation3gsgsgsgsdfgadgsfgfgsfgagsfgsfgzfdgsdgs.pptx
SUB03
 
本科硕士学历佛罗里达大学毕业证(UF毕业证书)24小时在线办理
Taqyea
 
Web Hosting for Shopify WooCommerce etc.
Harry_Phoneix Harry_Phoneix
 
The-Hidden-Dangers-of-Skipping-Penetration-Testing.pdf.pdf
naksh4thra
 
一比一原版(LaTech毕业证)路易斯安那理工大学毕业证如何办理
Taqyea
 
PE introd.pptxfrgfgfdgfdgfgrtretrt44t444
nepmithibai2024
 
英国假毕业证诺森比亚大学成绩单GPA修改UNN学生卡网上可查学历成绩单
Taqyea
 
Research Design - Report on seminar in thesis writing. PPTX
arvielobos1
 
Azure_DevOps introduction for CI/CD and Agile
henrymails
 
ONLINE BIRTH CERTIFICATE APPLICATION SYSYTEM PPT.pptx
ShyamasreeDutta
 
原版西班牙莱昂大学毕业证(León毕业证书)如何办理
Taqyea
 
Agilent Optoelectronic Solutions for Mobile Application
andreashenniger2
 
西班牙武康大学毕业证书{UCAMOfferUCAM成绩单水印}原版制作
Taqyea
 
Apple_Environmental_Progress_Report_2025.pdf
yiukwong
 
Orchestrating things in Angular application
Peter Abraham
 
Lec15_Mutability Immutability-converted.pptx
khanjahanzaib1
 
Computer Securityyyyyyyy - Chapter 1.ppt
SolomonSB
 
AI_MOD_1.pdf artificial intelligence notes
shreyarrce
 

Making User Authentication More Usable

  • 2. Context I’m a consultant to the National Institute of Standards and Technology Focusing on revising US Government digital identity standards Everything here is my own opinion; I don’t speak for NIST! This talk focuses on the usability aspects of authentication, and the security aspects only incidentally
  • 3. About SP 800-63 NIST Special Publication 800-63, Digital Identity Guidelines Intended for federal government use, but also widely used commercially and internationally
  • 4. Four-volume Set Enrollment and
 Identity Proofing
 SP 800-63A Authentication and
 Lifecycle Management
 SP 800-63B Federation and Assertions
 SP 800-63C
  • 5. Executive Order 13681, “Improving the Security
 of Consumer Financial Transactions” “…ensure that all agencies making personal data accessible to citizens through digital applications require the use of multiple factors of authentication and an effective identity proofing process, as appropriate.”
  • 6. Who are the Users? Everybody: Non-English speakers Homeless people Disabled veterans Hospital patients Physicians Elderly Students Usability needs to consider all of these Not just Federal employees! Photo by Rob Curran on Unsplash
  • 7. Usability Emphasis in
 SP 800-63-3 Engaged NIST human-factors specialists Included a Usability Considerations section in each volume (A, B, and C) Invited review on normative requirements that might affect usability
  • 8. Related Concepts Accessibility: Can users with various disabilities authenticate? Availability: Can users authenticate under all circumstances?
  • 9. Authenticators Nine authenticator types defined Memorized secret (password, PIN, etc.) Look-up secret Out-of-band device Single- and multi-factor OTP device Single- and multi-factor crypto software Single- and multi-factor crypto device
  • 10. Factors There are three authentication factors: Something you know (password) Something you have Something you are (biometric) Authenticators may provide 1 or 2 of these
  • 12. Memorized Secrets Passwords are: Most used authenticators Most hated authenticators Relatively weak But they’re the only “something you know” Security questions no longer acceptable
  • 13. Making Passwords More Usable Action Rationale Get rid of composition rules (include digits, symbols, etc.) Frustrating for users, less benefit than expected Allow all printing characters plus space Maximum freedom in selection; no technical reason otherwise Allow Unicode characters Memorable passwords in all languages Very long maximum length Encourage long passwords, passphrases
  • 14. Frustration vs. Security Recommend use of a blacklist for common passwords Unfortunately not very transparent Frustrated users make bad choices Weak passwords allowed Frustrated users Blacklist size
  • 15. Password Visibility Passwords are obscured to inhibit “shoulder surfing” Makes correct entry more difficult, and often there is no shoulder-surfing threat Recommend making passwords visible on request Future browser feature??
  • 16. Pasting Some sites disallow pasting: <input type="test" onPaste="return false”> Also disables password managers Done to enhance security, but probably encourages weaker passwords SP 800-63B discourages blocking pasting
  • 18. Look-up Secrets List of machine-generated one-time secrets Not intended for memorization: typically more complex Less usable/accessible because they require manual transcription, subject to misread/mistyping Cheap and very suitable as a backup authenticator
  • 19. Out-of-Band Requires a separate communication channel, usually separate device Availability: cell phone service is not always available Accessibility: Usually requires transcription of a secret from one device to another, often time-limited
  • 20. Single-factor One Time Password (OTP) Requires transcription from device to login session Time based OTP imposes a time limit on this process Photo credit: Wikimedia Commons
  • 21. Multi-factor OTP Requires transcription of secret from authenticator to login session Typing on small device may be challenging Photo credit: HID
  • 22. Cryptographic Software Authenticators Example: client certificate (with or without passphrase) Process for installation of authenticator on user device should be considered Authenticators need to be organized for identification
  • 23. Single-factor
 Cryptographic Device Availability: Requires an interface (e.g., USB) to connect to authenticating device Location of some ports is inconvenient for pushing the button Photo credit: Yubico
  • 24. Multi-factor Cryptographic Device Availability: Requires an interface or adapter to connect to authenticating device
  • 25. About Biometrics… Need to reproduce conditions of enrollment Choice of finger (fingerprint) Lighting conditions (iris) Facial hair, expression, glasses (face) Many modalities (fingerprint, iris, etc.) are not usable by some people Generally considered convenient to use, but familiarity is important
  • 26. Summary There isn’t a perfect authenticator, from either a usability or security standpoint Services should support a variety of ways to authenticate and to enroll multiple authenticators per user
  • 28. Identity Proofing Enrollment process: establishing that a digital identity corresponds to a specific individual Generally done only once at enrollment, but may be repeated if all authenticators are lost May be done in-person (preferred) or remotely Less sensitive to convenience, but more sensitive to accessibility (disabled, homeless, etc.)