- Montreal 2016
Single use codes delivered by Email and SMS, mobile phone verification using automated phone calls and installed apps, or standalone physical devices - there's more than one way to do 2-factor authentication.
There are benefits and downsides to each. Learn how each one works, and what is best for you and your users. Avoid common mistakes when rolling out 2FA, and take a look at how you can add one, or many, to your application's login's flow.
View all 151 sessions
Tim likes making things, is a lover of well built APIs, and hates the top reply. He's built applications utilizing numerous APIs, created custom APIs for internal consumption, and as a one time developer evangelist he's helped other developers do the same.
A long time mercenary PHP developer, he's a fan of Laminas (you know, ZendFramework), Doctrine (2 of course), TDD, and practical design patterns. He's now working on things at PhoneBurner and tweeting sporadically from @tjlytle.