that he or she has possession and control of an authenticator. In the simplest case, the authenticator is a common password. Using the terminology of the...
30 KB (3,661 words) - 20:52, 30 July 2025
Google Authenticator is a software-based authenticator by Google. It implements multi-factor authentication services using the time-based one-time password...
9 KB (943 words) - 05:34, 25 May 2025
WebAuthn (redirect from Web Authentication)
common authenticator type is a platform authenticator, which is built into the operating system of the device. Common platform authenticators include...
33 KB (3,298 words) - 14:29, 1 August 2025
applicant to become a subscriber. Authentication – After becoming a subscriber, the user receives an authenticator e.g., a token and credentials, such...
35 KB (4,025 words) - 23:00, 29 July 2025
Proton Authenticator is an open-source and end-to-end encrypted software-based authenticator. When logging into a website or application that supports...
3 KB (159 words) - 17:57, 2 August 2025
(default is 30 seconds). Both the authenticator and the authenticatee compute the TOTP value, then the authenticator checks whether the TOTP value supplied...
5 KB (617 words) - 04:52, 18 June 2025
Professional Sports Authenticator (PSA) is a US based sports card and trading card grading company. The PSA was founded in July 1991 by David Hall, owner...
15 KB (2,157 words) - 00:40, 21 April 2025
by an authenticator (e.g. a security token or smartphone) that only the user possesses. An authenticator app enables two-factor authentication in a different...
43 KB (4,790 words) - 16:10, 4 August 2025
software running on the client that provides credentials to the authenticator. The authenticator is a network device that provides a data link between the client...
26 KB (3,037 words) - 20:11, 27 July 2025
Kerberos (protocol) (redirect from Kerberos authentication protocol)
the TGS secret key) and the ID of the requested service. Message D: Authenticator (which is composed of the client ID and the timestamp), encrypted using...
27 KB (3,023 words) - 15:26, 31 May 2025
The Message Authenticator Algorithm (MAA) was one of the first cryptographic functions for computing a message authentication code (MAC). It was designed...
9 KB (954 words) - 09:25, 27 May 2025
confirm these two attributes, the authenticator may employ several different techniques. The key to authentication is the idea that there is no single...
2 KB (323 words) - 22:29, 22 August 2024
The Client to Authenticator Protocol (CTAP) or X.1278 enables a roaming, user-controlled cryptographic authenticator (such as a smartphone or a hardware...
5 KB (355 words) - 19:24, 4 August 2025
and CTAP2. An authenticator that implements one of these protocols is typically referred to as a U2F authenticator or a FIDO2 authenticator, respectively...
19 KB (1,886 words) - 20:29, 18 July 2025
RADIUS (redirect from Remote Authentication Dial In User Service)
including the Code, Identifier, Length, Authenticator and optional Attribute fields. The Authenticator is used to authenticate the reply from the RADIUS server...
33 KB (2,792 words) - 14:22, 16 September 2024
parameters; typically these are specified by the authenticator, and either accepted or not by the authenticated entity: A cryptographic hash method H (default...
10 KB (1,067 words) - 16:36, 18 July 2025
Comparison of OTP applications (category Password authentication)
Password manager List of password managers "Aegis Authenticator - Secure 2FA app for Android". Aegis Authenticator. Retrieved 29 April 2023. "Sending passwords...
19 KB (637 words) - 18:25, 23 June 2025
feature for Microsoft Authenticator app". WinCentral. Retrieved 22 December 2022. Lance Whitney. "How to use Microsoft Authenticator as your password manager"...
5 KB (347 words) - 16:59, 2 August 2025
Chrome which is adding Kerberos support with a solution like Hypergate Authenticator. SSPI (Security Support Provider Interface) NTLM (NT Lan Manager) SPNEGO...
10 KB (892 words) - 18:31, 26 May 2024
also known as digital authenticator, is used as an integrity check based on a secret key shared by two parties to authenticate information transmitted...
6 KB (609 words) - 13:36, 10 July 2025
combined. The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authenticator acknowledges...
6 KB (755 words) - 07:44, 28 May 2024
Authenticated encryption (AE) is any encryption scheme which simultaneously assures the data confidentiality (also known as privacy: the encrypted message...
19 KB (2,087 words) - 13:23, 24 July 2025
Mutual authentication or two-way authentication (not to be confused with two-factor authentication) refers to two parties authenticating each other at...
24 KB (3,032 words) - 11:26, 14 March 2025
Poly1305 (category Message authentication codes)
part of Poly1305-AES, a Carter–Wegman authenticator that combines the Poly1305 hash with AES-128 to authenticate many messages using a single short key...
17 KB (2,537 words) - 22:38, 24 July 2025
Proton AG (section Proton Authenticator)
Proton Authenticator is an open-source software-based authenticator. When logging into a website or application that supports multi-factor authentication, the...
28 KB (2,659 words) - 05:23, 6 August 2025
cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating and integrity-checking...
16 KB (1,918 words) - 14:30, 11 July 2025
SMTP Authentication, often abbreviated SMTP AUTH, is an extension of the Simple Mail Transfer Protocol (SMTP) whereby a client may log in using any authentication...
10 KB (1,229 words) - 16:16, 6 December 2024
one end of a point-to-point LAN segment that seeks to be authenticated by an authenticator attached to the other end of that link. The IEEE 802.1X standard...
7 KB (689 words) - 17:37, 25 January 2025
In the context of an HTTP transaction, basic access authentication is a method for an HTTP user agent (e.g. a web browser) to provide a user name and password...
7 KB (863 words) - 14:35, 30 June 2025
MS-CHAP (redirect from Microsoft Challenge Handshake Authentication Protocol)
Authentication Protocol. It provides an authenticator-controlled password change mechanism. It provides an authenticator-controlled authentication retry...
5 KB (586 words) - 13:29, 2 February 2025