{"id":745,"date":"2022-11-15T14:23:54","date_gmt":"2022-11-15T14:23:54","guid":{"rendered":"https:\/\/infobip.com\/developers\/?p=745"},"modified":"2023-09-11T14:33:02","modified_gmt":"2023-09-11T14:33:02","slug":"a-hitchhikers-guide-to-mfa","status":"publish","type":"post","link":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa","title":{"rendered":"A Hitchhiker\u2019s guide to MFA"},"content":{"rendered":"\n<p>When someone gets hacked, most people think it looks like a scene from&#8230; well, the Hackers. Lots of typing, encryption cracking, mad random-code-typing skills. But the truth is much more boring and much scarier for companies &#8211; most attacks exploit human errors, not system flaws.<\/p>\n\n\n\n<p>As Shift on the Road took to Seattle and San Francisco, the digital giants of the USA, <strong>Julia Biro<\/strong>, <a href=\"https:\/\/infobip.com\/developers\/\">Infobip&#8217;s Developer Relations<\/a> Team Lead, tackled this topic on stage.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"480\" src=\"https:\/\/infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png\" alt=\"Julia Biro, Infobip\" class=\"wp-image-765\" srcset=\"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png 800w, https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup-300x180.png 300w, https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup-768x461.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<p>Before diving into how authentication and authorization methods fall short, let&#8217;s first make sure we know the difference between the two. Authentication is<strong> checking that you are who you say you are<\/strong>. Then there&#8217;s authorization, which is checking whether you have permission to access whatever resources or information you&#8217;re trying to get.<\/p>\n\n\n\n<p><strong>Two-factor authentication <\/strong>(2FA) and <strong>Multi-factor authentication<\/strong> (MFA) are industry standards, whether you&#8217;re trying to log into your social media accounts or access super secret plans to take over the world. They have something in common, and that is the factor part, Julia points out:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The factor is just a piece of evidence used to prove that you are who you say you are.<\/p>\n<\/blockquote>\n\n\n\n<p>This evidence can come in several forms. It can be<strong> something you know<\/strong>, like a PIN, password, or passphrase. It can also be something you own, like your phone. Lastly, it can be something inherently yours, like a fingerprint. Knowledge, the oldest way factor of authentication, remains the most popular one to date and in most cases, it&#8217;s just passwords:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>I&#8217;m going to say it flat out. In most cases, y<em>our password does not matter at all.<\/em><\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">Brute forcing an eight-character password takes about a day<\/h2>\n\n\n\n<p>The five most common hacking techniques are credential stuffing, phishing, keystroke logging, local discovery, and extortion. With any of those, the strength of your password doesn&#8217;t even matter, because the attacker already has access to your password. <\/p>\n\n\n\n<p>The only two instances when password strength proves to be of service are during a password spray attack and brute forcing. The former is the practice of getting a large set of very common passwords and testing them against a list of email addresses or user names. The latter means that someone is spending time and resources trying to get into your account by guessing your personal password. <\/p>\n\n\n\n<p>This is when being prudent and using a longer password proves to be a good choice:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Brute forcing an eight-character password takes about a day with modern technology. The good news is that every time you add a character to your password, the complexity of the process increases significantly. It takes one day to hack an eight-character password, three months to hack a nine-character password, and ten years to hack a ten-character password.<\/p>\n<\/blockquote>\n\n\n\n<p>The best practice is, of course, to use a different password for every account you have and not to save it to your browser. Here&#8217;s the kicker &#8211; most people know that, but simply don&#8217;t care: <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><a href=\"https:\/\/www.lastpass.com\/resources\/ebook\/psychology-of-passwords-2021\">LastPass did a survey,<\/a> and 59% of the users reused passwords multiple times. 91% of them were aware of the risks and did it anyway.<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"480\" src=\"https:\/\/infobip.com\/developers\/wp-content\/uploads\/2022\/11\/26julia-biro-san-francisco-meetup.png\" alt=\"\" class=\"wp-image-766\" srcset=\"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/26julia-biro-san-francisco-meetup.png 800w, https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/26julia-biro-san-francisco-meetup-300x180.png 300w, https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/26julia-biro-san-francisco-meetup-768x461.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Why is 2FA via SMS evil?<\/h2>\n\n\n\n<p>2FA definitely provides an added layer of security &#8211; if implemented correctly. It is convenient and has dev-friendly APIs and SDKs, but it does have some shortcomings, and they usually come in the form of network providers:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The point of failure is the human working for your phone network provider. The most common type of fraud in the UK is calling the network provider and porting a user&#8217;s number.<\/p>\n<\/blockquote>\n\n\n\n<p>Other common hacks are the interception of an SMS, phishing via SMS, faking to be a network provider, and then redirecting SMS. People do not know that a phone number is not in fact a unique ID. <\/p>\n\n\n\n<p>Another important thing to note is that <strong>2FA via SMS<\/strong> is <strong>not the same as password reset via SMS<\/strong>, even though they often come bundled as a service. When you reset your password with an SMS you are not protected. There was even a <a href=\"https:\/\/www.issms2fasecure.com\/assets\/sim_swaps-01-10-2020.pdf\">study that proves how password reset via SMS gives a false sense of security<\/a>. So, why do we still use it? In a way, 2FA via SMS is to blame. It is more affordable and widely available, but it sets up the infrastructure for a password reset via SMS:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Companies usually enable both because they don&#8217;t know the difference or they just don&#8217;t care.<\/p>\n<\/blockquote>\n\n\n\n<p>This is where Julia sees an opportunity to make a difference when designing applications and building authentication processes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is security a losing battle then? Spoiler: Not quite.<\/h2>\n\n\n\n<p>So what&#8217;s the hot take from Julia&#8217;s talk?<\/p>\n\n\n\n<p><em>It is always the human that fails<\/em>.<\/p>\n\n\n\n<p>We can engineer the perfect applications with the ideal authentication flow, but the human factor always fails, concludes Julia. People will usually choose the protection which offers the least resistance and that almost always means weaker security. Some people will lock their life savings behind a password that has their partner&#8217;s name in it, or maybe an anniversary:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>So I don&#8217;t know where we went wrong, but I think it is on us to catch up to what we do in real life and deploy risk-based authentication, which is the happy middle ground.<\/p>\n<\/blockquote>\n\n\n\n<p>Risk-based authentication uses real-time intelligence to gain a holistic view of the context behind each login. It analyzes factors such as<strong> device, location, network, <\/strong>and<strong> sensitivity of the information <\/strong>you are trying to get. <\/p>\n\n\n\n<p>There must be a way to balance a decent user experience while providing an appropriate security level. That space represents a place where great innovation can happen. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>When someone gets hacked, most people think it looks like a scene from&#8230; well, the Hackers. Lots of typing, encryption cracking, mad random-code-typing skills. But the truth is much more boring and much scarier for companies &#8211; most attacks exploit human errors, not system flaws.<\/p>\n","protected":false},"author":8,"featured_media":765,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_import_markdown_pro_load_document_selector":0,"_import_markdown_pro_submit_text_textarea":"","footnotes":""},"categories":[28,249,254],"tags":[35,36,37,34],"coauthors":[152],"class_list":["post-745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-post","category-devops-and-security","category-engineering-practices","tag-2fa","tag-authentication","tag-authorization","tag-mfa"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hitchhiker&#039;s Guide to MFA | Infobip Developers Hub<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hitchhiker&#039;s Guide to MFA | Infobip Developers Hub\" \/>\n<meta property=\"og:description\" content=\"When someone gets hacked, most people think it looks like a scene from... well, the Hackers. Lots of typing, encryption cracking, mad random-code-typing skills. But the truth is much more boring and much scarier for companies - most attacks exploit human errors, not system flaws.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa\" \/>\n<meta property=\"og:site_name\" content=\"Infobip Developers Hub\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/infobip\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-15T14:23:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-11T14:33:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marin Paveli\u0107\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InfobipDev\" \/>\n<meta name=\"twitter:site\" content=\"@InfobipDev\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marin Paveli\u0107\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa\"},\"author\":{\"name\":\"Marin Paveli\u0107\",\"@id\":\"https:\/\/www.infobip.com\/developers\/#\/schema\/person\/9491debd8545887f123e78ccb27653da\"},\"headline\":\"A Hitchhiker\u2019s guide to MFA\",\"datePublished\":\"2022-11-15T14:23:54+00:00\",\"dateModified\":\"2023-09-11T14:33:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa\"},\"wordCount\":934,\"publisher\":{\"@id\":\"https:\/\/www.infobip.com\/developers\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png\",\"keywords\":[\"2FA\",\"authentication\",\"authorization\",\"MFA\"],\"articleSection\":[\"Blog Post\",\"DevOps and Security\",\"Engineering Practices\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa\",\"url\":\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa\",\"name\":\"Hitchhiker's Guide to MFA | Infobip Developers Hub\",\"isPartOf\":{\"@id\":\"https:\/\/www.infobip.com\/developers\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png\",\"datePublished\":\"2022-11-15T14:23:54+00:00\",\"dateModified\":\"2023-09-11T14:33:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#primaryimage\",\"url\":\"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png\",\"contentUrl\":\"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png\",\"width\":800,\"height\":480,\"caption\":\"Julia Biro, Infobip\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.infobip.com\/developers\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Hitchhiker\u2019s guide to MFA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.infobip.com\/developers\/#website\",\"url\":\"https:\/\/www.infobip.com\/developers\/\",\"name\":\"Infobip Developers Hub\",\"description\":\"Build meaningful customer relationships across any channel\",\"publisher\":{\"@id\":\"https:\/\/www.infobip.com\/developers\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.infobip.com\/developers\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.infobip.com\/developers\/#organization\",\"name\":\"Infobip Developers Hub\",\"url\":\"https:\/\/www.infobip.com\/developers\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infobip.com\/developers\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2023\/03\/Infobip_logo_favicon.png\",\"contentUrl\":\"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2023\/03\/Infobip_logo_favicon.png\",\"width\":696,\"height\":696,\"caption\":\"Infobip Developers Hub\"},\"image\":{\"@id\":\"https:\/\/www.infobip.com\/developers\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/infobip\/\",\"https:\/\/x.com\/InfobipDev\",\"https:\/\/www.youtube.com\/channel\/UCUPSTy53VecI5GIir3J3ZbQ\",\"https:\/\/github.com\/infobip-community\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.infobip.com\/developers\/#\/schema\/person\/9491debd8545887f123e78ccb27653da\",\"name\":\"Marin Paveli\u0107\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infobip.com\/developers\/#\/schema\/person\/image\/e4af6ea9cf4f04a335f11e11d4b47e5c\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ad470215316fe41c3b4c221e38e692a266551b0229c029911f5474b1133013d9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ad470215316fe41c3b4c221e38e692a266551b0229c029911f5474b1133013d9?s=96&d=mm&r=g\",\"caption\":\"Marin Paveli\u0107\"},\"url\":\"https:\/\/www.infobip.com\/developers\/blog\/author\/marinpavelic\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hitchhiker's Guide to MFA | Infobip Developers Hub","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa","og_locale":"en_US","og_type":"article","og_title":"Hitchhiker's Guide to MFA | Infobip Developers Hub","og_description":"When someone gets hacked, most people think it looks like a scene from... well, the Hackers. Lots of typing, encryption cracking, mad random-code-typing skills. But the truth is much more boring and much scarier for companies - most attacks exploit human errors, not system flaws.","og_url":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa","og_site_name":"Infobip Developers Hub","article_publisher":"https:\/\/www.facebook.com\/infobip\/","article_published_time":"2022-11-15T14:23:54+00:00","article_modified_time":"2023-09-11T14:33:02+00:00","og_image":[{"width":800,"height":480,"url":"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png","type":"image\/png"}],"author":"Marin Paveli\u0107","twitter_card":"summary_large_image","twitter_creator":"@InfobipDev","twitter_site":"@InfobipDev","twitter_misc":{"Written by":"Marin Paveli\u0107","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#article","isPartOf":{"@id":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa"},"author":{"name":"Marin Paveli\u0107","@id":"https:\/\/www.infobip.com\/developers\/#\/schema\/person\/9491debd8545887f123e78ccb27653da"},"headline":"A Hitchhiker\u2019s guide to MFA","datePublished":"2022-11-15T14:23:54+00:00","dateModified":"2023-09-11T14:33:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa"},"wordCount":934,"publisher":{"@id":"https:\/\/www.infobip.com\/developers\/#organization"},"image":{"@id":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#primaryimage"},"thumbnailUrl":"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png","keywords":["2FA","authentication","authorization","MFA"],"articleSection":["Blog Post","DevOps and Security","Engineering Practices"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa","url":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa","name":"Hitchhiker's Guide to MFA | Infobip Developers Hub","isPartOf":{"@id":"https:\/\/www.infobip.com\/developers\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#primaryimage"},"image":{"@id":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#primaryimage"},"thumbnailUrl":"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png","datePublished":"2022-11-15T14:23:54+00:00","dateModified":"2023-09-11T14:33:02+00:00","breadcrumb":{"@id":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#primaryimage","url":"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png","contentUrl":"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2022\/11\/25julia-biro-san-francisco-meetup.png","width":800,"height":480,"caption":"Julia Biro, Infobip"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infobip.com\/developers\/blog\/a-hitchhikers-guide-to-mfa#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infobip.com\/developers\/"},{"@type":"ListItem","position":2,"name":"A Hitchhiker\u2019s guide to MFA"}]},{"@type":"WebSite","@id":"https:\/\/www.infobip.com\/developers\/#website","url":"https:\/\/www.infobip.com\/developers\/","name":"Infobip Developers Hub","description":"Build meaningful customer relationships across any channel","publisher":{"@id":"https:\/\/www.infobip.com\/developers\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infobip.com\/developers\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infobip.com\/developers\/#organization","name":"Infobip Developers Hub","url":"https:\/\/www.infobip.com\/developers\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infobip.com\/developers\/#\/schema\/logo\/image\/","url":"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2023\/03\/Infobip_logo_favicon.png","contentUrl":"https:\/\/www.infobip.com\/developers\/wp-content\/uploads\/2023\/03\/Infobip_logo_favicon.png","width":696,"height":696,"caption":"Infobip Developers Hub"},"image":{"@id":"https:\/\/www.infobip.com\/developers\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/infobip\/","https:\/\/x.com\/InfobipDev","https:\/\/www.youtube.com\/channel\/UCUPSTy53VecI5GIir3J3ZbQ","https:\/\/github.com\/infobip-community"]},{"@type":"Person","@id":"https:\/\/www.infobip.com\/developers\/#\/schema\/person\/9491debd8545887f123e78ccb27653da","name":"Marin Paveli\u0107","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infobip.com\/developers\/#\/schema\/person\/image\/e4af6ea9cf4f04a335f11e11d4b47e5c","url":"https:\/\/secure.gravatar.com\/avatar\/ad470215316fe41c3b4c221e38e692a266551b0229c029911f5474b1133013d9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad470215316fe41c3b4c221e38e692a266551b0229c029911f5474b1133013d9?s=96&d=mm&r=g","caption":"Marin Paveli\u0107"},"url":"https:\/\/www.infobip.com\/developers\/blog\/author\/marinpavelic"}]}},"_links":{"self":[{"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/posts\/745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/comments?post=745"}],"version-history":[{"count":50,"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/posts\/745\/revisions"}],"predecessor-version":[{"id":2005,"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/posts\/745\/revisions\/2005"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/media\/765"}],"wp:attachment":[{"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/media?parent=745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/categories?post=745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/tags?post=745"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.infobip.com\/developers\/wp-json\/wp\/v2\/coauthors?post=745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}