Skip to main content

Best Practice Challenge Response Authentication

This document introduces the concept of challenge/response authentication, where users are authenticated by answering a series of personal questions. It then describes a number of best practices for robust, usable deployment of challenge/response authentication techniques.

Please register

Access to this document requires registration. Please fill in the form below. The full document will be emailed to you automatically.



Information
required Your company/organization name:
required Your name:
Your title:
Your work telephone number:
required Your work e-mail address:
required Total number of staff in your company:
Please check the information you entered above before continuing.
Click to continue:
page top page top