The combination of Username / Password is over 50 years old method for identification – why are we still using it today, when there are much superior methods available?
Passwords are Ancient Technology
Login failed, please check your username and password. Login failed, please check your username and password. Login failed, please check…
Every one of us has experienced this frustrating situation. With the rapid development of technology and global digitalization, a growing portion of our daily actions are happening in ways which require registration and logging in to a certain service. For most people, this also applies for working.
During a typical workday, we are constantly logging in to various services and platforms such as e-mail accounts, CRMs, ERPs, etc. To get access to any of these, identification is required from the user. To this day, the most common method for identification is still the combination of a personal username and password.
The combination of username and password as a method of identification has been around for over 50 years. During this time, technology has developed with accelerating pace, so it seems strange that we still use this ancient relic of identification methods on a daily basis. Using usernames and passwords would be easier to justify if the method offered a pleasent user experience or high level of security – but it doesn’t do either of these.
To be even somewhat secure of a method, the passwords used by a person would have to be structurally strong, and the same credentials should not be used in multiple locations. The fact that the average number of passwords for a single person has risen from tens to over a hundred, makes this kind of inconvenient. Not many people want, or are even able to remember hundreds of unique usernames and passwords. When there are many far superior ways for identification available, wouldn’t it be a high time to let the good old username/password retire at last?
Password Management Software
Password Management Software are a popular method of getting rid of having to remember numerous usernames and passwords by heart. This type of software stores a user’s passwords in an encrypted database. The user can then access all the stored passwords by using a single master password. Some Password Management Software work on a single device, but most of them utilize cloud technology to store the passwords, enabling access to the stored information with any device in case the original device breaks down or is lost.
Password Management Software offers great benefits for their users, but they also have significant downsides. Many of these software offer a free-to-use version, but these often come with limitations regarding the number of stored passwords for example. In most cases, to gain full access to all the properties, the user has to pull out a credit card and subscribe to a monthly payment plan. Even with the full versions, the usage of a single software to store all your passwords isn’t always possible. Many companies strictly define which software its employees must use in work-related password management.
So, in the end you still have to remember multiple passwords in order to not having to do so. Another thing to consider when using Password Management Software is the security – in the case of a security breach, large amounts of personal identification data can end up in the wrong hands at once.
Many internet browsers and e.g. Apple’s operating systems offer password managers as a built-in property, but the use of these solutions is usually limited to that specific platform only. The most popular universal Password Management Software include LastPass, KeePass, 1Password and Dashlane for example.
Multi Factor Authentication
Another popular method to use instead of just the traditional username/password combinations is Multi Factor Authentication (MFA). When using MFA, the user has to provide another way of identification evidence in addition to a username and password to be granted access. The additional way of identification can be a physical object only the user possesses, or a one-time security token generated by a smartphone application for example. Using MFA eliminates the possibility of unauthorized use with username and password alone, thus providing added security.
The downside of MFA is the poor user experience – the identification takes a lot more time, and the user always has to have the additional identification evidence with him. In case the object used for identification is lost, or the battery of the user’s smartphone dies out for example, logging in is not possible.
The third alternative method for replacing the numerous usernames and passwords is to use AD Authentication (Active Directory Authentication), which is a technology based on OAuth 2.0 Open Standard. To put it simply, AD Authentication is a service, which stores the identification and access information of an organization in a single database.
When using AD Authentication, the user does not communicate directly with a service while logging in – the communication happens through a trusted third party called Key Distributor center (KDC). The KDC utilizes a combination of short- and long-term Security Keys to verify the identity of both parties (the User and the Service) before allowing them to connect. In addition to a high level of security, AD Authentication also provides an improved user experience with a feature called Single-Sign-On (SSO). SSO utilizes AD Authentication technology so, that the user only has to log in to the service once – after the initial login, the user is granted access to several different locations and services without having to provide identification again.
Bluugo’s Tracking Cloud™ platform has a built-in API for Microsoft’s popular Azure AD service. This makes logging in to Tracking Cloud™ fast, easy and secure by utilizing the authentication service already used by numerous companies – no need for another password!
Earlier this year, the World Wide Web Consortium (W3C) formally promoted WebAuthn (short for Web Authentication) API to the title of Official Web Standard for identification. The goal of WebAuthn is to replace the use of traditional username/password combination in web environments by allowing web pages to communicate directly with devices used for identification. Identification methods supported by WebAuthn are for example USB FIDO-keys and biometric identification methods such as fingerprint identification. Most web browsers, including Chrome, Firefox, Edge and Safari, are already supporting the WebAuthn API and the rest will follow soon.
WebAuthn makes identification much more user friendly – the process only takes a couple of seconds and the user doesn’t have to type in usernames or passwords. The level of security is also on a totally different level than with the traditional username/password combination: WebAuthn utilizes asymmetric Public/Private Key technology, which means that the user does not hand over his identification information directly to the service in question at any point. This greatly increases security against data breaches and phishing, which have been on the rise for the past couple of years.
Bluugo’s Tracking Cloud™ platform supports the WebAuthn API, making logging in to the service fast, easy and secure utilizing fingerprint identification. The benefits of fingerprint login are highlighted especially when Tracking Cloud™ is used with mobile devices – field personnel can easily log in to the system without having to type usernames or passwords, which can be very frustrating with the small keypads of smart phones. In order to avoid having to type in their usernames and passwords repeatedly, people are often tempted to save their credentials on the smart phone’s memory. This is a bad practice which can lead to serious security hazards in case the device is lost. With WebAuthn Fingerprint Identification, logging in to Tracking Cloud™ only takes a few seconds while making unauthorized use extremely difficult.
Want To Know More?
Check out the video below to see how fast & easy logging in to Tracking Cloud™ is using the WebAuthn Fingerprint Identification. If you want hear more about our solutions, fill in your contact information or give us a call – we’re happy to tell you more.
Say Goodbye to Passwords with Tracking Cloud™ Fingerprint Login