My guess is 2fa code apps. Why you ask? Because blizzard already did it. They use their own proprietary 2fa code generator app called battle net, so I have to use it. So after a few months/years of casually not using anything remotely connected with Mr. And Mrs. „Muttermilchknacker”
explanation
(A word derived from the „Panzerknacker” series of comics where the same named group of idiotic bandits try to break open a gold vault full of money, which I use since the scandal where someone stole the lactation bottle of someone working at Activision)
, I finally decided to try Overwatch 2 again, and when I tried to use my login app to confirm my login, I found myself logged out. And when I tried to log in again, I had to use the Authenticator, which I was logged out of, to use my authenticator, in order to log into the authenticator, in order to use the authenticator, in order to log into my authenticator (I could keep going like this forever)
Every morning at work it’s:
>Type in a password to Decrypt laptop drive
>Type in a password to Sign in to laptop account
>Type in a password to Sign into 1password
>Copy password for okta from 1pw
>Use fingerprint to Unlock my phone
>Type in 2FA code from my phone Google authenticator into okta
>Finally log into outlook
>Need to log into a system not behind SSO
>Type in a password to Re-unlock 1password
>Oopsie-poopsie phone died!
>Charge phone for 5 min so I can turn it on
>Type in phone password because you can’t use biometrics after shutdown
>Open Google authenticator and get 2FA for system
>“Sorry your authentication attempt has timed out”
>Type in password to unlock 1password
>Copy password to system
>Type in 2FA code from phone
>Finally logged into system so I can do work
>Oh it’s meeting time anyway
>Meeting is 30 mins
>After meeting get back to the tab with the system
>“You’ve been logged out due to inactivity”
I’d honestly rather drink a verification can.
These systems are design by people who have never had to use them. Then implemented by people who need to justify their jobs.
Nah I work in cybersec, the reason these systems are in use is because of compliance standards that are created as insurance corpos have against each others’ incompetence during vendor reviews.
Problem is as anyone working in the corporate world can tell you they are infinitely incompetent and their reviews are a clown world clusterfuck. But that’s what they get when the unifying motivation is greed, and everyone is paid by the hour.
Personally seeing the C-suite with their rolexes and shit, I ain’t too fussed letting the clock run out due to their bullshit, I’m just gonna go play CTFs or make drum and bass.
I’m gonna have to disagree even though it is an annoying process listed above.
In this case there was a drive encryption password to prevent data theft if the device is stolen, OS login for user level access, a password keeper login at the application level, and MFA on a different app. That is 5 different auths (drive, os, pw keeper, email, MFA) for 5 unassociated objects managed by potentially 5 different entities. The only reason this was an issue was the dead phone for MFA, which is a user error. It super sucks that this is best practice because of bad actors, but this is baseline auth.
I am curious how you would do this differently though if you’ve got ideas. In this case, assuming the OS is Windows and email is Outlook, this could have all been handled with SSO, which would have only required the first two passwords, which is my daily work experience. However, I then get into Bitwarden and log into any not SSO apps I need and have MFA configured for all that support. I work remote a lot and my company is looking at an always VPN connection for everything. That would require me to go through another level or two of auth.
If the device is encrypted and single-user there is no good reason to require further login after the first. If user is AFK then it locks, but then they should only need to type in that password. All this inconvenience is due to overlapping security practices that aren’t designed together.
I have to sign in to 2-5 programs to complete service for customers
I use shared terminals so I have to sign out when I am done
Each task takes about 3-4 minutes of computer work, feels like most of my time spent is typing in a 15 character password in 2-5 programs. I do this all day, 8hr shift, graveyards.
I just change a single digit number on this password when the 90 day rotation happens. Typing it in incorrectly 3 times gets me locked out, a call to IT. I work for tips, no time for that. My work environment is distracting, noisy and stressful, so even if I wanted to use “best practices” in choosing passwords, I really shouldn’t.
Management refuses to replace keyboards that aren’t in good repair. Several have keys that stick.
I type in a 15-char password probably 100+ times a day.
my phone is dead for 2fa
Lmao skill issue
Who tf keeps their phone charged all day bruh I’m not nearly addicted enough to this shit for thar
Do you not charge it when you sleep? I don’t even have to charge mine every day because it’s pretty new and I’m barely on it. And I use GrapheneOS so it’s debloated.
who tf lets their phone discharge midday. does the battery only last 2 hours?
I have a 6 year old phone which gets charged overnight as I sleep. It still makes it though the day. What the heck are you running which is chewing up your battery so badly?
Our ticketing portal likes to log me out on occasion.
And that can happen while writing a support-report or having the editor for the documentation open.
I had multiple times where I have written a report for a 5h remote and troubleshooting session only to get logged out and being prompted on 15 tabs to authenticate… (╯°□°)╯︵ ┻━┻)
And that’s why I use a url on my desktop to a 2fa generator that also decodes it with the 2fa key as an argument. It’s like a password sticky note on the monitor, but for 2fa haha.
I’ve found two that work but one is playing up, just append your key where there is [KEY] and save the shortcut
https://totp.danhersam.com/?key=KEY
https://2fa.zone/2fa/KEY (broken but https://2fa.zone/ works)
Example: https://totp.danhersam.com/?key=7J64V3P3E77J3LKNUGSZ5QANTLRLTKVL