Implementing 2FA: How Time-Based One-Time Password Actually Works [With Python Examples]by@luizguilhermefr
4,936 reads

Implementing 2FA: How Time-Based One-Time Password Actually Works [With Python Examples]

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Implementing 2FA: How Time-Based One-Time Password Actually Works [With Python Examples] The most popular 2FA method today is to use an authenticator app on your cellphone to generate a temporary password that expires within a minute or less. The TOTP algorithm is defined on the IETF RFC 6238, where it says the shared key "should be chosen at random or using a cryptographically strong pseudorandom generator properly seeded with a random value" It consists of issuing a secret key on your server and reading it on your phone, then using this secret key to generate passwords.

Company Mentioned

Mention Thumbnail
featured image - Implementing 2FA: How Time-Based One-Time Password Actually Works [With Python Examples]
Luiz Rosa HackerNoon profile picture

@luizguilhermefr

Luiz Rosa

Computer Scientist, Software Engineer @ Loadsmart, Machine Learning enthusiast


Receive Stories from @luizguilhermefr

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!