Who would have dreamed – even ten years ago – how many ways we’d have to authenticate users in 2017? While passwords and tokens were the foundation of identity and access management for many years, today there’s an array of options to choose from: multi-factor authentication (MFA), standards-based solutions, biometrics and smartphone-based authentication – just to name a few.
Blog by Lori MacVittie, Principal Technical Evangelist at F5
You might have figured out that yes, I’m one of those people playing Pokémon Go. Or, as is often the case of late, not playing Pokémon Go. That’s bad, because it also means our youngest is not playing, because as it turns out we’re both using Pokémon Trainer Club (PTC) accounts to play, not Google accounts, and we can’t get in.