<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TISA &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/tisa/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Sat, 31 Oct 2015 10:00:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>TISA &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>TSA tries to get grasp on second factor &#8211; taking simple measures</title>
		<link>https://www.privacyidea.org/tsa-tries-to-get-grasp-on-second-factor-taking-simple-measures/</link>
					<comments>https://www.privacyidea.org/tsa-tries-to-get-grasp-on-second-factor-taking-simple-measures/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Sat, 31 Oct 2015 08:20:51 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[TISA]]></category>
		<category><![CDATA[Yubikey]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=778</guid>

					<description><![CDATA[Two factor authentication or multi factor authentication is ment to raise the bar for attackers. They ought to sniff, brute-force or social-engineer your password and in addition steal or &#8220;borrow&#8221; your hardware token for a &#8220;test&#8221;. Still, I wish to think that the Yubikey &#8211; being the product of originally a sole Swedish company &#8211; has no back doors. So [&#8230;]]]></description>
										<content:encoded><![CDATA[<figure id="attachment_779" aria-describedby="caption-attachment-779" style="width: 300px" class="wp-caption alignleft"><a href="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-085326.png"><img decoding="async" class="wp-image-779 size-medium" src="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-085326-300x117.png" alt="Tweet by flexlibris" width="300" height="117" srcset="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-085326-300x117.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-085326.png 551w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-779" class="wp-caption-text">live experience with TISA on twitter by @flexlibris</figcaption></figure>
<p>Two factor authentication or multi factor authentication is ment to raise the bar for attackers. They ought to sniff, brute-force or social-engineer your password and in addition steal or &#8220;borrow&#8221; your hardware token for a &#8220;test&#8221;.</p>
<p>Still, I wish to think that the Yubikey &#8211; being the product of originally a sole Swedish company &#8211; has no back doors. So as long as the TISA does not know of side channel attacks or you used a static password with the Yubikey, you might be fine as long as you get the same Yubikey back &#8211; undestroyed.</p>
<p>Nevertheless there are additional measures you can take to improve your security with privacyIDEA.</p>
<p><strong>Disclaimer</strong>: This will only help, if you are using your hardware token to authenticate to remote systems. If you use your hardware token to unlock let&#8217;s say encrypted harddisk of your notebook, you are carrying, this will not help.</p>
<h2>Set up privacyIDEA</h2>
<p>When you manage your hardware token for remote access with privacyIDEA and you are crossing borders or you are in situations where you</p>
<ol>
<li>think your hardware token could be stolen or otherwise compromised and</li>
<li>you do not need the token explicitly (since you are on the plane without internet access)</li>
</ol>
<p>you might want to call your trusted privacyIDEA administrator (some call it help desk) and have your hardware token locked.</p>
<p>This way the hardware token can not be used to access restricted resources. If TISA is still insisting to get your Yubikey, you can say:</p>
<blockquote><p>&#8220;If you take it, you can keep it&#8221;</p></blockquote>
<p>(No of course you can take it back, but you may see it as compromised and you might need to reenroll it.)</p>
<p>If TISA takes the Yubikey there is not use for them, since the token is locked.</p>
<figure id="attachment_782" aria-describedby="caption-attachment-782" style="width: 300px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-091415.png"><img decoding="async" class="wp-image-782 size-medium" src="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-091415-300x119.png" alt="Token detail view of a disabled token" width="300" height="119" srcset="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-091415-300x119.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-091415-1024x406.png 1024w, https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-091415.png 1212w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-782" class="wp-caption-text">The token is disabled and can not be used for authentication.</figcaption></figure>
<p>If TISA did not get your Yubikey and you crossed the border, customs or control successfully, you may call your trusted privacyIDEA admin again to reactivate the hardware token.</p>
<h2>Conclusion</h2>
<p>This might sound a bit complicated but also to simple. But special events like travelling to certain rogue regimes may require special measures.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/tsa-tries-to-get-grasp-on-second-factor-taking-simple-measures/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
