• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 622
  • Last Modified:

PCI Question: One Time Passwords and Two Factor Authentication

Some of my secure online web sites have me request a one time password which can be sent as a text message to my phone, sent to an email account or heard via telephone robot.  Then to access the site in question you enter your name password and the one time password.  This appears to be a type of two factor authentication also.  It would seem superior to manage to a smart card in that smart cards break, get out of synch etc.  Everyone pretty much already owns a smart phone (or is afforded one from their company).  

From a PCI perspective would username, password plus this type of One Time Password count as two factor?
1 Solution
This is an accepted method of two-factor authentication, as it satisfies two of the three possible factors:

1. Something you know (password in this case)
2. Something you have (cell phone)
3. Something you are (typically biometric - not relevant in this case)

Interestingly, if you're using an iPhone 5s or other phone with fingerprint scanning, you're employing three-factor authentication, which significantly increases security.

What you describe satisfies two-factor authentication because it would require an attacker to compromise your password _and_ physically acquire your phone.  Note that the sending of a text is a critical component as it is device-dependent.  Sending an email with a password token would not be the same and wouldn't satisfy PCI requirements, since an email could be viewed from virtually any device.

Some may argue that this isn't a "pure" representation of "something you have" since a text message could technically be intercepted and is not independent of the 1st factor, but this method is in use fairly extensively and satisfies PCI requirements.
amigan_99Network EngineerAuthor Commented:
Thank you!
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now