February 24-26, 2016
Montreal, Canada

Robust Two-Factor Authentication

Single use codes delivered by Email and SMS, mobile phone verification using automated phone calls and installed apps, or standalone physical devices - there's more than one way to do 2-factor authentication.

There are benefits and downsides to each. Learn how each one works, and what is best for you and your users. Avoid common mistakes when rolling out 2FA, and take a look at how you can add one, or many, to your application's login's flow.

View all 151 sessions

Tim Lytle

PhoneBurner

Tim likes making things, is a lover of well built APIs, and hates the top reply. He's built applications utilizing numerous APIs, created custom APIs for internal consumption, and as a one time developer evangelist he's helped other developers do the same.

A long time mercenary PHP developer, he's a fan of Laminas (you know, ZendFramework), Doctrine (2 of course), TDD, and practical design patterns. He's now working on things at PhoneBurner and tweeting sporadically from @tjlytle.

Read More

Comments

Please remain courteous and constructive. Comments will be moderated.

Montreal 2016 sponsored by