From the course: Writing Secure Code for Android by Infosec
Unlock this course with a free trial
Join today to access over 25,400 courses taught by industry experts.
Authentication, part 2
From the course: Writing Secure Code for Android by Infosec
Authentication, part 2
- Authentication, Part 2. Here's a biometric authentication example. Now, we'll play with biometrics. Let's pretend we already set up a login prompt and now we want to handle the callback on login success. 'cause the system has the biometric authenticator. You have the app that basically says, here's a biometric prompt. Oh, and by the way, if you can't do biometrics, you can use username and password. But you go and do biometric authentication. And if that works, then the biometric system calls back to the app and says, "Yeah, they logged in okay." So here's our authentication callback, and if it succeeded, then we're going to get a result, which is basically let them see the main layout, let them see the main view, let it become visible. So you authenticated, now you can see the main layout of the app. Here's an example of a one-time passcode. So I go to, you know, my email and I've already set it up for a little stronger two-factor authentication. So as soon as I log in with my…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Authentication, part 111m 34s
-
(Locked)
Authentication, part 211m 3s
-
(Locked)
Activity: Implementing a password checker, part 114m 53s
-
(Locked)
Activity: Implementing a password checker, part 215m 3s
-
(Locked)
Google sign-in5m 50s
-
(Locked)
Activity: Signing in with Google and Facebook7m 48s
-
(Locked)
Keys, tokens, and secrets6m 55s
-
(Locked)
Biometrics9m 30s
-
(Locked)
Activity: Implementing biometrics12m 13s
-
(Locked)
Two-factor authentication12m 5s
-
(Locked)
Authorization, part 111m 48s
-
(Locked)
Authorization, part 25m 40s
-
(Locked)
Authorization, part 35m 40s
-
(Locked)
Activity: Implementing runtime permissions6m 35s
-
(Locked)
Activity: Role-based access control14m 39s
-
(Locked)
OAuth8m 52s
-
(Locked)
Insecure direct object reference5m 37s
-
(Locked)
Session management, part 111m 41s
-
(Locked)
Session management, part 24m 10s
-
(Locked)
Activity: Implementing session management11m 21s
-
(Locked)
-
-