How To Make Passwords Obsolete - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

07:06 AM
Connect Directly

How To Make Passwords Obsolete

Why do we still rely on the human-memorized password for authentication? Here are seven alternatives worth considering.
1 of 10

(Image: Geralt via Pixabay)

(Image: Geralt via Pixabay)

We've all complained about passwords for years, yet very little has changed. If you had asked me five years ago about the future of the username and password authentication mechanism, I would have proclaimed that the practice would be long dead by now. And I would have been wrong.

That raises two questions: Why do we still rely on the human-memorized password for authentication, and what methods are out there that could finally render it obsolete?

On the following pages, we'll talk about seven of the top password alternatives. Some of these methods, such as fingerprint and facial recognition, have been around for a while, but are being implemented in new areas. Other forms of authentication leverage the popularity of social networking, using our Facebook or Twitter accounts to let us access other applications on the Internet. Still others let us use our smartphones as an authentication mechanism. Whether through the use of geolocation identification, NFC/Bluetooth transmissions, or other app-based authentication, smartphones and other smart devices can act as a set of virtual house keys that grant us access to all of our protected digital assets.

In order for many of the authentication methods presented here to work, there needs to be a change in philosophy in terms of what levels of security are needed. Risk levels need to be determined on a per-application and per-authorization level. If risk levels are low, perhaps a simplified authentication method will suffice. When risk levels are high, by all means lock it down like Fort Knox.

The point is that the password is no longer the best way to authenticate users. Now, it's a matter of choosing the right authentication method for your system or application and implementing the authentication tool that best suits your needs. Check out these promising authentication methods, and tell us in the comments section below whether you think any of them can actually replace the password.

Andrew has well over a decade of enterprise networking under his belt through his consulting practice, which specializes in enterprise network architectures and datacenter build-outs and prior experience at organizations such as State Farm Insurance, United Airlines and the ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
1 of 10
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 3 / 3
User Rank: Ninja
4/7/2015 | 3:47:14 PM
Re: making passwords obsolete
I agree.  While signing in with partner sites (such as social media sites) seems easier, it just opens a lot of issues around privacy and security.  The problem with passwords is that they are still rooted in human behavior, that is to be easy on the user, which often means there is a large security trade off.  Users know they should be using complex passwords, but are they actually doing so?  Probably not.
User Rank: Apprentice
4/7/2015 | 11:58:06 AM
making passwords obsolete
It seems like most of these solutions are designed to make it easier to use, not more secure.  How does logging in with your social media account make things more secure?  Yes, it means you have one less password to remember, but it also means that if your social media account is hacked, the hacker not only can send Facebook messages on your behalf, but can also empty your bank account.  That doesn't seem like a good plan to me. 

How does Yahoo's plan to eliminate passwords in favor of text message tokens make you more secure?  That means (a) if your phone is lost or compromised, so is your Yahoo account and (b) since text messages are sent in the clear, an eavesdropper can just listen in and snatch it.

Security or convenience - pick either one.  

Client side certificates are an interesting solution that has been around for a long time, but there are challenges regarding revoking them (3 out of 4 Fortune 2000 companies still have not revoked or replaced their SSL certificates compromised during Heartbleed.).  There are also challenges of moving the certificates from computer to computer as you move around (home to work to Grandma's house).

We need to continue to discuss the situation and try different things, but I don't think we have found a silver bullet yet.

My two cents.
<<   <   Page 3 / 3
Why 2021 May Turn Out to be a Great Year for Tech Startups
John Edwards, Technology Journalist & Author,  2/24/2021
How GIS Data Can Help Fix Vaccine Distribution
Jessica Davis, Senior Editor, Enterprise Apps,  2/17/2021
11 Ways DevOps Is Evolving
Lisa Morgan, Freelance Writer,  2/18/2021
White Papers
Register for InformationWeek Newsletters
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.
Flash Poll