My guess is 2fa code apps. Why you ask? Because blizzard already did it. They use their own proprietary 2fa code generator app called battle net, so I have to use it. So after a few months/years of casually not using anything remotely connected with Mr. And Mrs. „Muttermilchknacker”

explanation

(A word derived from the „Panzerknacker” series of comics where the same named group of idiotic bandits try to break open a gold vault full of money, which I use since the scandal where someone stole the lactation bottle of someone working at Activision)

, I finally decided to try Overwatch 2 again, and when I tried to use my login app to confirm my login, I found myself logged out. And when I tried to log in again, I had to use the Authenticator, which I was logged out of, to use my authenticator, in order to log into the authenticator, in order to use the authenticator, in order to log into my authenticator (I could keep going like this forever)

  • BassTurd@lemmy.world
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    2 months ago

    I’m gonna have to disagree even though it is an annoying process listed above.

    In this case there was a drive encryption password to prevent data theft if the device is stolen, OS login for user level access, a password keeper login at the application level, and MFA on a different app. That is 5 different auths (drive, os, pw keeper, email, MFA) for 5 unassociated objects managed by potentially 5 different entities. The only reason this was an issue was the dead phone for MFA, which is a user error. It super sucks that this is best practice because of bad actors, but this is baseline auth.

    I am curious how you would do this differently though if you’ve got ideas. In this case, assuming the OS is Windows and email is Outlook, this could have all been handled with SSO, which would have only required the first two passwords, which is my daily work experience. However, I then get into Bitwarden and log into any not SSO apps I need and have MFA configured for all that support. I work remote a lot and my company is looking at an always VPN connection for everything. That would require me to go through another level or two of auth.

    • Ravn@lemmy.ml
      link
      fedilink
      arrow-up
      4
      ·
      2 months ago

      If the device is encrypted and single-user there is no good reason to require further login after the first. If user is AFK then it locks, but then they should only need to type in that password. All this inconvenience is due to overlapping security practices that aren’t designed together.

      • sylver_dragon@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 months ago

        If the device is encrypted and single-user there is no good reason to require further login after the first.

        The reason is non-repudation. Ignoring the fact that the drive’s encryption should have been handled by TPM and not be bothering the user, the drive encryption password does not establish who is using the laptop, only that they know the unlock password. Unfortunately, those unlock password are usually centrally assigned and managed, which means that they are not something that only the user knows. Also, it doesn’t have a good second factor. If the laptop is stolen, there is nothing keeping an attacker out, if they know the password. Their account, on the other hand, should have a password only the user knows. Yes, central IT can reset the password, but this creates logs which show the reset and can be used to prove that the password was reset, and who reset it. And the user’s password can be backed up with a second factor. So, a stolen laptop isn’t an easy on-ramp to the organization’s network.

        As for logins after that, it gets harder to justify. OS, email and most web portal logins should be handled via SSO. For most users, this should mean that their drive gets decrypted via TPM, they type their password into the OS login prompt, deal with 2FA and that’s it. For users with admin access to stuff, there will be a separate login step when they need to elevate permissions, but that should largely be limited to IT staff and developers. For the original poster, it sounds like their organization’s IT is being run on a shoestring by someone who either doesn’t know or isn’t allowed to do it well.

        • Ravn@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          2 months ago

          My assumption was that the user sets the decryption password. Yes, if the decryption password is not your own then you may want your own password on top of that. The point was that there is in principle no reason for requiring the user to enter more than one personal password per session.

        • thepreciousboar@lemm.ee
          link
          fedilink
          arrow-up
          2
          ·
          2 months ago

          If a password is centrally assigned and managed it is not a safe passqword, regardless of other security measures

          • BassTurd@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            2 months ago

            That’s the nature of how AD works. The vast majority of businesses operate in that manner. Maybe not so much assigned other than resets and service accounts, but they are managed centrally. My user password is stored on my companies AD. They didn’t know it, but it is managed there. That doesn’t make it a not safe password, but that’s also why other security is recommended instead of just one password.

      • BassTurd@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        2 months ago

        If my personal laptop is stolen, my drive encryption will protect my data. Without that, physical access is enough to pull info unencrypted. A user password will prevent OS access both locally and remote. If someone happens to get my password or bypasses my login somehow, I don’t want them to be able to open my email and read messages, or open a browser, go to a logged in Amazon page, and be able to order items. I personally don’t keep anything logged in and everything logs out when my browser is closed. It’s inconvenient, but to the tune of an extra minute each day to login to everything.

        Really, you just have to decide your risk tolerance. Businesses have a lot at stake and therefore it behooves them to force strict auth policies. If you aren’t concerned about your personal stuff, set a login password if you want, and put your creds in browser, but I’d urge to at least use a password keeper over a browser.