Windows Login: Two-factor authentication (2FA) (Feature Requests)

%3CLINGO-SUB%20id%3D%22lingo-sub-3272104%22%20slang%3D%22en-US%22%3EWindows%20Login%3A%20Two-factor%20authentication%20(2FA)%20(Feature%20Requests)%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3272104%22%20slang%3D%22en-US%22%3E%3CP%3EMulti-factor%20authentication%20is%20used%20in%20many%20areas%2C%20but%20I%20don't%20yet%20know%20of%20its%20implementation%20for%20a%20Windows%20user's%20local%20account.%20However%2C%20you%20can%20go%20a%20step%20further.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20exposition%20refers%20to%20authentication%20on%20the%20local%20computer%20(the%20focus%20here%20does%20not%20deal%20with%20other%20areas%20such%20as%20remote%20access%2C%20etc.)%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAuthentication%20has%20been%20implemented%20with%20systems%20such%20as%20password%2C%20PIN%2C%20pattern%20in%20an%20image%2C%20fingerprint%2C%20facial%20recognition%2C%20physical%20keys%2C%20etc.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CU%3EThese%20systems%20are%20classified%20into%3A%3C%2FU%3E%3C%2FP%3E%3CP%3E%3CFONT%20color%3D%22%23008000%22%3E%3CSTRONG%3EMemo%20Elements%3C%2FSTRONG%3E%3A%3C%2FFONT%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Password%2C%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%20PIN%2C%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Pattern%3C%2FP%3E%3CP%3E%3CSTRONG%3E%3CFONT%20color%3D%22%230000FF%22%3EPhysical%20Elements%3C%2FFONT%3E%3C%2FSTRONG%3E%3A%26nbsp%3B%26nbsp%3B%26nbsp%3B%20Fingerprint%2C%20%26nbsp%3B%26nbsp%3B%20Facial%2C%26nbsp%3B%20Key%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAs%20we%20can%20only%20use%20one%20of%20them%20as%20a%20means%20of%20authentication%2C%20it%20would%20be%20very%20easy%20for%20an%20attacker%20to%20overtake%20them%2C%20so%20our%20desktop%20would%20be%20exposed.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23008000%22%3E%3CU%3EMemo%20Elements%3C%2FU%3E%3C%2FFONT%3E%3C%2FSTRONG%3E%3CU%3E%3A%3C%2FU%3E%20We%20are%20being%20educated%20to%20use%20long%20and%20complicated%20passwords%2C%20to%20be%20safe%20from%20brute%20force%20attacks.%3C%2FP%3E%3CP%3ETherefore%2C%20these%20complicated%20passwords%20are%20usually%20written%20on%20paper%20or%20in%20a%20text%20file%20(memorizing%20it%20is%20difficult).%3C%2FP%3E%3CP%3EPrying%20eyes%20make%20a%20local%20environment%20with%20high%20vulnerability.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3E%3CFONT%20color%3D%22%230000FF%22%3E%3CU%3EPhysical%20Elements%3C%2FU%3E%3C%2FFONT%3E%3C%2FSTRONG%3E%3A%20their%20use%20can%20be%20forced%20by%20force%20or%20theft.%20With%20the%20%22Memo%20Elements%22%20it%20is%20more%20difficult%20to%20force%20them%20to%20be%20revealed.%3C%2FP%3E%3CP%3EThis%20scenario%20could%20occur%20in%20people%20with%20access%20to%20very%20important%20information%2C%20and%20in%20their%20own%20homes%2C%20bank%20directors%2C%20technology%20companies%2C%20etc.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EGiven%20this%20weakness%2C%20of%20a%20single%20control%20point%2C%20%3CSTRONG%3Eoptionally%3C%2FSTRONG%3E%2C%20for%20those%20who%20consider%20it%20necessary%2C%20having%20a%20%3CSTRONG%3Esecond%20barrier%3C%2FSTRONG%3E%20could%20avoid%20many%20breakdowns%2C%20although%20when%20talking%20about%20security%20we%20already%20know%20that%20it%20will%20never%20be%20100%25.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20%3CSTRONG%3E%3CFONT%20color%3D%22%230000FF%22%3EPhysical%20Elements%3C%2FFONT%3E%3C%2FSTRONG%3E%20give%20more%20agility%2C%20but%20they%20are%20weak%2C%20relying%20only%20on%20these%20systems%20weakens%20my%20security.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPersonally%20I%20have%20a%20password%20and%20a%20pin%20very%20long%20and%20difficult%20to%20remember%2C%20so%20I%20use%20a%20%3CFONT%20color%3D%22%230000FF%22%3EPhysical%20Element%3C%2FFONT%3E%20(Fingerprint)%20to%20which%20I%20would%20like%20to%20add%20a%20token%20%2F%20%22salt%22%20(auxiliary%2C%20attached%20or%20complementary%20key)%2C%20%3CSTRONG%3Eoptional%3C%2FSTRONG%3E%2C%20call%20it%20what%20you%20want%20but%20that%20is%20very%20simple%20in%20its%20daily%20use.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMy%20%22salt%22%20(short%20key%20of%201%20to%204%20characters)%20is%20easy%20to%20memorize%20and%20type.%3C%2FP%3E%3CP%3EFor%20example%3A%20%22kk%22%2C%20%22asdf%22%2C%20%22123%22%2C%20%22%C3%B1lk%22%2C%20%22%C3%A7%22%2C%20etc.%3C%2FP%3E%3CP%3EAt%20the%20same%20time%20it%20is%20difficult%20to%20detect%20how%20to%20write.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CFONT%20color%3D%22%23CF3600%22%3E%3CSTRONG%3ESo%20every%20time%20I%20identify%20with%3A%20%22fingerprint%22%20and%20write%20%22kk%22%20is%20ready.%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3E%3CU%3EFalse%20Door%3C%2FU%3E%3C%2FSTRONG%3E%3CU%3E%3A%3C%2FU%3E%3C%2FP%3E%3CP%3ETo%20avoid%20intimidation%20we%20can%20have%20two%20versions%20for%20the%20%22salt%22%2C%20the%20%3CSTRONG%3ETrue%20Door%3C%2FSTRONG%3E%20of%20which%20we%20have%20already%20spoken%2C%20and%20another%20called%20%3CSTRONG%3EFalse%20Door%3C%2FSTRONG%3E%20that%20give%20the%20appearance%20of%20having%20provided%20the%20true%20key%20but%20is%20an%20identification%20that%20tells%20the%20system%20to%20appear%20a%20normal%20login%20without%20being%20able%20to%20access%20critical%20information.%3C%2FP%3E%3CP%3ESchematic%20table%3A%20there%20may%20be%20more%20elements%20at%20play%2C%20and%20you%20would%20have%20to%20look%20at%20them%20and%20fill%20in%20this%20table%20in%20a%20thoughtful%20way%2C%20but%20what%20is%20clear%20to%20me%20is%20that%20if%20I%20could%20choose%20to%20activate%20my%20%22sauce%22%20I%20would%20apply%20it%20unequivocally%20to%20the%20%3CFONT%20color%3D%22%230000FF%22%3EPhysical%20Elements%3C%2FFONT%3E.%3C%2FP%3E%3CTABLE%20width%3D%22510%22%3E%3CTBODY%3E%3CTR%3E%3CTD%20width%3D%2298%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2283%22%3E%3CP%3E%3CFONT%20color%3D%22%23008000%22%3EPassword%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2249%22%3E%3CP%3E%3CFONT%20color%3D%22%23008000%22%3EPIN%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%3CFONT%20color%3D%22%23008000%22%3EPattern%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E%3CFONT%20color%3D%22%230000FF%22%3EFingerprint%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%3CFONT%20color%3D%22%230000FF%22%3EFacial%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%3CFONT%20color%3D%22%230000FF%22%3EPhysical%20keys%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E%3CSTRONG%3E%3CFONT%20color%3D%22%23CF3600%22%3ESalt%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FP%3E%3C%2FTD%3E%3C%2FTR%3E%3CTR%3E%3CTD%20width%3D%2298%22%3E%3CP%3E%3CFONT%20color%3D%22%23008000%22%3EPassword%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2283%22%3E%3CP%3E-%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2249%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3ENo%3C%2FP%3E%3C%2FTD%3E%3C%2FTR%3E%3CTR%3E%3CTD%20width%3D%2298%22%3E%3CP%3E%3CFONT%20color%3D%22%23008000%22%3EPIN%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2283%22%3E%3CP%3ENo%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2249%22%3E%3CP%3E-%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3ENo%3C%2FP%3E%3C%2FTD%3E%3C%2FTR%3E%3CTR%3E%3CTD%20width%3D%2298%22%3E%3CP%3E%3CFONT%20color%3D%22%23008000%22%3EPattern%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2283%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2249%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E-%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3C%2FTR%3E%3CTR%3E%3CTD%20width%3D%2298%22%3E%3CP%3E%3CFONT%20color%3D%22%230000FF%22%3EFingerprint%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2283%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2249%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E-%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E%3CFONT%20color%3D%22%23CF3600%22%3E%3CSTRONG%3EYes%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3C%2FTR%3E%3CTR%3E%3CTD%20width%3D%2298%22%3E%3CP%3E%3CFONT%20color%3D%22%230000FF%22%3EFacial%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2283%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2249%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E-%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E%3CFONT%20color%3D%22%23CF3600%22%3E%3CSTRONG%3EYes%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3C%2FTR%3E%3CTR%3E%3CTD%20width%3D%2298%22%3E%3CP%3E%3CFONT%20color%3D%22%230000FF%22%3EPhysical%20keys%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2283%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2249%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E%3F%3F%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2253%22%3E%3CP%3E-%3C%2FP%3E%3C%2FTD%3E%3CTD%20width%3D%2261%22%3E%3CP%3E%3CFONT%20color%3D%22%23CF3600%22%3E%3CSTRONG%3EYes%3C%2FSTRONG%3E%3C%2FFONT%3E%3C%2FP%3E%3C%2FTD%3E%3C%2FTR%3E%3C%2FTBODY%3E%3C%2FTABLE%3E%3CP%3EThis%20scheme%20can%20grow%20with%20elements%20such%20as%3A%20mobile%20fingerprint%2C%20bluetooth%20proximity%2C%20voice%2C%20OTP%2C%20etc.%20But%20to%20understand%20the%20idea%20is%20enough.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Occasional Visitor

Multi-factor authentication is used in many areas, but I don't yet know of its implementation for a Windows user's local account. However, you can go a step further.

 

This exposition refers to authentication on the local computer (the focus here does not deal with other areas such as remote access, etc.)

 

Authentication has been implemented with systems such as password, PIN, pattern in an image, fingerprint, facial recognition, physical keys, etc.

 

These systems are classified into:

Memo Elements:        Password,      PIN,    Pattern

Physical Elements:    Fingerprint,    Facial,  Key

 

As we can only use one of them as a means of authentication, it would be very easy for an attacker to overtake them, so our desktop would be exposed.

 

Memo Elements: We are being educated to use long and complicated passwords, to be safe from brute force attacks.

Therefore, these complicated passwords are usually written on paper or in a text file (memorizing it is difficult).

Prying eyes make a local environment with high vulnerability.

 

Physical Elements: their use can be forced by force or theft. With the "Memo Elements" it is more difficult to force them to be revealed.

This scenario could occur in people with access to very important information, and in their own homes, bank directors, technology companies, etc.

 

Given this weakness, of a single control point, optionally, for those who consider it necessary, having a second barrier could avoid many breakdowns, although when talking about security we already know that it will never be 100%.

 

The Physical Elements give more agility, but they are weak, relying only on these systems weakens my security.

 

Personally I have a password and a pin very long and difficult to remember, so I use a Physical Element (Fingerprint) to which I would like to add a token / "salt" (auxiliary, attached or complementary key), optional, call it what you want but that is very simple in its daily use.

 

My "salt" (short key of 1 to 4 characters) is easy to memorize and type.

For example: "kk", "asdf", "123", "ñlk", "ç", etc.

At the same time it is difficult to detect how to write.

 

So every time I identify with: "fingerprint" and write "kk" is ready.

 

False Door:

To avoid intimidation we can have two versions for the "salt", the True Door of which we have already spoken, and another called False Door that give the appearance of having provided the true key but is an identification that tells the system to appear a normal login without being able to access critical information.

Schematic table: there may be more elements at play, and you would have to look at them and fill in this table in a thoughtful way, but what is clear to me is that if I could choose to activate my "sauce" I would apply it unequivocally to the Physical Elements.

 

Password

PIN

Pattern

Fingerprint

Facial

Physical keys

Salt

Password

-

 

 

 

 

 

No

PIN

No

-

 

 

 

 

No

Pattern

??

??

-

 

 

 

??

Fingerprint

??

??

??

-

 

 

Yes

Facial

??

??

??

??

-

 

Yes

Physical keys

??

??

??

??

??

-

Yes

This scheme can grow with elements such as: mobile fingerprint, bluetooth proximity, voice, OTP, etc. But to understand the idea is enough.

 

0 Replies