• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Townsend Taps Authy To Strengthen 2FA on IBM i

    February 14, 2018 Alex Woodie

    Townsend Security adopted a new smartphone app called Authy to deliver one-time authentication codes to users in the latest release of its two-factor authentication (2FA) solution for IBM i. The new Authy solution replaces the text messaging-based approach that it previously used, which soon will likely be no longer compliant with PCI regulations.

    2FA solutions are the emerging standard for authentication in the enterprise, following the long downward spiral in the effectiveness and efficiency of using passwords to confirm identity. Nearly everybody carries a smartphone these days, and enterprises have tried multiple ways to incorporate that fact into their authentication schemes.

    One of the first 2FA techniques involved the use of Short Message Service (SMS) codes. When a user needed to identify herself to gain entry into a secured system, she could request a code be texted to her smartphone. Townsend Security‘s 2FA solution for IBM i, called Alliance Two Factor Authentication, used the SMS service from its partner Twilio to send one-time codes to users via text. Townsend’s solution also supported a voice-based code delivery service too.

    While the SMS form of 2FA is still widely used by banks and other consumer-facing firms, a change in the Payment Card Industry (PCI) Data Security Standard (DSS) will soon make text-based 2FA an outdated technique, according to Patrick Townsend, CEO and founder of the Olympia, Washington, security company.

    The changes are being made to eliminate a potential leak of authentication information in the traditional way that 2FA has been implemented up to this point, Townsend says. While the changes are not yet officially part of the PCI DSS, guidance from the PCI group indicates the changes are likely to become a requirement soon.

    “The PCI guidance correctly points out that most implementations of 2FA are actually ‘two step authentication,'” Townsend tells IT Jungle. “That is, you enter a user ID and password first, then if that is correct, you enter a numeric 2FA PIN code. This is how Google email works, as an example.

    “The PCI guidance correctly points out that two-step authentication leaks important security information,” he continues. “For example, an attacker would know that the user ID and password are correct before entering the 2FA PIN code. Since we humans are addicted to using the same user IDs and passwords on many sites, this could lead to breaches on other sites and web services.”

    Under the new PCI guidance, users must enter a user ID and password (something you know) and a 2FA PIN code (something you have from your mobile phone) at the same time, Townsend continues. “If either or both of them are invalid, the application must indicate an authentication failure, but not tell the user which is invalid. This provides a more secure authentication process.”

    The Authy mobile app generates authentication passwords, or tokens, that work only for a short period of time.

    The new release of Alliance Two Factor Authentication utilizes the Authy app to generate time-based one time passwords (TOTP). Because the Authy app and Alliance Two Factor Authentication are synched, if the TOTP entered by the users’ IBM i sign-on screen is correct, they’ll be granted access. If it’s incorrect, they’ll be denied access. However, the user (ostensibly a Syrian super-hacker with a DSL line and mad IBM i hacking skills) won’t know which set of credentials was bad – the user ID, the IBM i password, or the TOTP.

    One of the side benefits of using Authy (which is owned by Twilio) is that it works even when the smartphone has no Internet connection. Authy stores a number of pre-generated TOTPs that will work even when there’s no network connection between the smartphone and the Authy service.

    Townsend says the new Authy-based approach will be a boon to IBM i users who want to implement strong authentication but leave behind the cost and complexity that hardware-based token solutions have traditionally entailed.

    “The Authy service is secure, extremely affordable, easy to administer, and highly performant,” Townsend says. “IBM i customers can install Alliance Two Factor Authentication in a few minutes, provision an Authy account on their websites, and be using two factor authentication very quickly. It’s a fast path to PCI compliance and better security.”

    Townsend will continue to support SMS text delivery of one time codes, but the new Authy facility is the default for new installations, the company says. Customers on existing maintenance contracts can upgrade to the new version of Alliance Two Factor Authentication at no cost.

    RELATED STORIES

    Understanding Your 2FA Options for IBM i

    Time To Get Your 2FA On, IBM i Admins

    Townsend Looks to Spread 2FA Far and Wide

    Townsend Launches 2FA To Thwart Cyber Attacks On IBM i

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: 2FA, IBM i, Payment Card Industry Data Security Standard (PCI DSS), PCI, SMS, Two-Factor Authentication

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Four Hundred Monitor, February 14 New IBM i Technology Refreshes Announced; Available Mid-March

    Leave a Reply Cancel reply

TFH Volume: 28 Issue: 12

This Issue Sponsored By

  • ProData Computer Services
  • Harkins & Associates
  • Rocket Software
  • T.L. Ashford
  • WorksRight Software

Table of Contents

  • At Long Last, IBM i Finally Gets Power9
  • New IBM i Technology Refreshes Announced; Available Mid-March
  • Townsend Taps Authy To Strengthen 2FA on IBM i
  • Four Hundred Monitor, February 14
  • IBM i PTF Guide, Volume 20, Number 6

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle