<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>two-factor-authentication Archive - Pixelfriedhof</title>
	<atom:link href="https://pixelfriedhof.com/en/tag/two-factor-authentication-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://pixelfriedhof.com/en/tag/two-factor-authentication-en/</link>
	<description>IT-Blog, Fotoblog, Travelblog, Nerdstuff</description>
	<lastBuildDate>Sat, 22 Feb 2020 10:18:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>

<image>
	<url>https://pixelfriedhof.com/wp-content/uploads/2022/02/cropped-My-project-3-32x32.png</url>
	<title>two-factor-authentication Archive - Pixelfriedhof</title>
	<link>https://pixelfriedhof.com/en/tag/two-factor-authentication-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Two-Factor Authentication vs. One-Time-Password (OTP) &#8211; difference and correlation</title>
		<link>https://pixelfriedhof.com/en/two-factor-authentication-vs-one-time-password-otp-difference-and-correlation/</link>
					<comments>https://pixelfriedhof.com/en/two-factor-authentication-vs-one-time-password-otp-difference-and-correlation/#respond</comments>
		
		<dc:creator><![CDATA[megaadmin]]></dc:creator>
		<pubDate>Sat, 22 Feb 2020 09:59:59 +0000</pubDate>
				<category><![CDATA[IT relevant topics]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[One-Time-Password]]></category>
		<category><![CDATA[OTP]]></category>
		<category><![CDATA[two-factor-authentication]]></category>
		<guid isPermaLink="false">https://pixelfriedhof.com/?p=2301</guid>

					<description><![CDATA[<p>The terms two-factor authentication and one-time password are often used synonymously, even by industry leaders. This is actually wrong. There are differences, but also dependencies between the two terms.</p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/two-factor-authentication-vs-one-time-password-otp-difference-and-correlation/">Two-Factor Authentication vs. One-Time-Password (OTP) &#8211; difference and correlation</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The terms two-factor authentication and one-time password are often used synonymously, even by industry leaders. This is actually wrong. There are differences, but also dependencies between the two terms.</p>



<p>A two-factor authentication, as the name suggests, requires a second factor in addition to the classic primary password key. Strictly speaking, even a login with username and two different passwords would be two-factor authentication; even though this would not add any security value.</p>



<p>Often, so-called one-time passwords are used as a second factor.</p>



<p>These are either taken from a list or generated by a generator. In any case, with these OTPs it must be ensured that server and client (system and user) always know synchronously which OTP is currently valid.</p>



<p>Back to topic: two-factor authentication often uses one-time passwords as a second factor, but OTPs can also be used beyond two-factor authentication as an autonomous security mechanism.</p>



<p>The payment service provider &#8220;Klarna&#8221;, for example, completely waives asking for the classic password and storing it. Instead, every time a known user logs in, the delivery of a one-time password to the user via SMS is triggered.</p>



<p>This approach is actually quite clever, as it minimizes the risks involved in storing a password with the web service provider. In the event of a security breach, attackers could not capture sensitive login data.</p>



<p>An additional security risk does not arise from the exclusive OTP login. On the contrary, the elimination of the &#8220;password reset functions&#8221; closes a potential attack vector, since this function is simply obsolete.</p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/two-factor-authentication-vs-one-time-password-otp-difference-and-correlation/">Two-Factor Authentication vs. One-Time-Password (OTP) &#8211; difference and correlation</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://pixelfriedhof.com/en/two-factor-authentication-vs-one-time-password-otp-difference-and-correlation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to deactivate Google Two-Factor-Authentication in Joomla via database</title>
		<link>https://pixelfriedhof.com/en/how-to-deactivate-google-two-factor-authentication-in-joomla-via-database/</link>
					<comments>https://pixelfriedhof.com/en/how-to-deactivate-google-two-factor-authentication-in-joomla-via-database/#respond</comments>
		
		<dc:creator><![CDATA[megaadmin]]></dc:creator>
		<pubDate>Wed, 05 Oct 2016 17:00:03 +0000</pubDate>
				<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Joomla]]></category>
		<category><![CDATA[mysql]]></category>
		<category><![CDATA[two-factor-authentication]]></category>
		<guid isPermaLink="false">http://pixelfriedhof.com/?p=115</guid>

					<description><![CDATA[<p>I've been using Googles Two-Factor-Authentification for for Joomla for quite a while. But after restoring my iPhone i noticed, that the backup didn't include all the configured accounts. I was locked out of my Joomla-accounts without a way to surpass the Google Two-Factor-Authentication.</p>
<p>The following manual describes how to deactivate Two-Factor-Authentication via the database-backend to regain access to the Joomla-backend.</p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/how-to-deactivate-google-two-factor-authentication-in-joomla-via-database/">How to deactivate Google Two-Factor-Authentication in Joomla via database</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I&#8217;ve been using Googles Two-Factor-Authentification for for Joomla for quite a while. But after restoring my iPhone i noticed, that the backup didn&#8217;t include all the configured accounts. I was locked out of my Joomla-accounts without a way to surpass the Google Two-Factor-Authentication.</p>
<p>The following manual describes how to deactivate Two-Factor-Authentication via the database-backend to regain access to the Joomla-backend.</p>
<p>Follow the following steps to enable a user to login into the Joomla-backend without having to enter a two-factor-code.<br />
Please replace prefix &#8216;#####&#8217; with the prefix used in your Joomla-database. Every Joomla-installation uses an individual prefix.</p>
<p><p >Keine Produkte gefunden.</p></p>
<ol>
<li>Log in to the database management tool of your choice (PHPMyAdmin, SQL ManagementStudio eg.)</li>
<li>The table &#8220;#####_extensions&#8221; contains all the plugins registered in your Joomla-installation. &nbsp;One f them is the plugin for Google&#8217;s Two-Factor-Authentication. Open this table.</li>
<li>Search the table &#8220;#####_extensions&#8221; for the row with the entry &#8220;plg_twofactorauth_totp&#8221; in the column &#8220;name&#8221;.</li>
<li>Set the entry of the colum &#8220;enabled&#8221; from 1 to 0.&nbsp;</li>
<li>The table &#8220;#####_users&#8221; contains all users. Open this table.</li>
<li>Search the table &#8220;#####_users&#8221; for the row containing the affected username.</li>
<li>Search for the column &#8220;otpKey&#8221; in the row of the affected user from step 6. Note that entry for security reasons.</li>
<li>Search for the column &#8220;otep&#8221; in the row of the affected user from step 6. Note that entry for security reasons.</li>
<li>Delete both entrys from steps 7 and 8 out of the database.</li>
<li>Log in to the Joomla-backend with the affected user without providing a two-factor-code.</li>
</ol>
<p><p >Keine Produkte gefunden.</p></p>
<p><span style="font-size: 8pt;">All the links in this text are Amazon Affiliate Links, and by clicking on an affiliate link I will earn a percentage of your subsequent Amazon purchases. However, this circumstance does not influence the background of my product recommendation. This product recommendation is independent, honest and sincere.&nbsp;</span></p>
<p><span style="font-size: 8pt;">Bei allen genannten Links handelt es sich um Amazon-Affiliate-Links. Durch einen Klick auf einen Affiliate-Link werde ich prozentual an Euren darauf folgenden Amazon-Einkäufen beteiligt. Dieser Umstand beeinflusst aber nicht die Hintergründe meiner Produktempfehlung. Diese Produktempfehlung erfolgt unabhängig, ehrlich und aufrichtig.</span></p>
<p>Der Beitrag <a href="https://pixelfriedhof.com/en/how-to-deactivate-google-two-factor-authentication-in-joomla-via-database/">How to deactivate Google Two-Factor-Authentication in Joomla via database</a> erschien zuerst auf <a href="https://pixelfriedhof.com/en">Pixelfriedhof</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://pixelfriedhof.com/en/how-to-deactivate-google-two-factor-authentication-in-joomla-via-database/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
