6 Authentication Best Practices

Feb 25, 2022 by 

Sakshyam Shah

best practices

Our previous blog post on authentication security covered six most common authentication vulnerabilities. In this post, we will discuss a few best practices that help avoid authentication vulnerabilities and defeat specific attack vectors.

Below are the six best practices to secure the authentication process.

1. Prioritize passwordless authentication

Passwords and password-based authentication processes are plagued with security threats such as phishing and password cracking. And the passwordless authentication approach is the way to eliminate these threats. But why is password-based authentication still widely implemented? The answer to this probably is because password-based authentication is easier to implement, and the solution "just works".

Passwordless authentication often requires special devices, and if the software is published for a broader demographic, it can be challenging, if not impossible, to enforce passwordless authentication. But with the growth in adoption of smartphones with Touch ID and Face ID features and the availability of easy-to-carry hardware security tokens such as U2F keys and specifications such as WebAuthn, now is the perfect time to prioritize passwordless authentication. (Here's where you can learn why it's time to get rid of passwords.)

2. Implement federated login and single sign-on (SSO)

Single sign-on (SSO) allows users to login into multiple applications with a single set of credentials. And federated login allows users to authenticate with identities attested by 3rd party (e.g., log in with Google, log in with Facebook). Unless your software application is an identity provider, it makes little sense to implement an identity verification process. Authentication standards such as OAuth2, OpenID Connect and SAML make it much easier to implement a federated login and SSO.

An important caution when using federated authentication and SSO is correctly implementing the authenticity exchange process. Although these standards are secure by design, the security depends on implementation. As with any software, vulnerabilities in the protocol implementation are common. Learn more on best practices for SAML and OAuth2.

3. Harden authentication functionality

Hardening authentication functionality is an essential part of properly implementing your authentication flows. Below are six best practices that help avoid logical flaws and secure the authentication functionality.

Secure account recovery process

An insecure account recovery process can be exploited to bypass the authentication process. Below are a few important functionalities to consider when developing an account recovery process:

  • The account recovery process should be protected with a second-factor authentication step.
  • Generate a cryptographically secure random value for reset tokens.
  • Ensure reset tokens are sent over HTTPS.
  • Expire reset tokens on first use and enforce a short time-to-live (TTL).
  • Re-authenticate users for password update even if they are already in an authenticated session.
  • Protect the account recovery process from CSRF attacks.

Secure session management

Since sessions hold users' authenticated state, compromising the session management process allows malicious users to bypass the authentication process or impersonate as other users. Below are a few important functionalities to consider when implementing the session management process.

  • Use cryptographically secure random values for session cookies.
  • A session should always be managed on the server-side.
  • Implement cookie security attributes including Secure, HttpOnly, SameSite, Domain, Path, Expire and Max-Age.
  • Cautiously store session data in localStorage and sessionStorage.
  • Ensure session tokens are regenerated on each new login and destroyed after the user logs out.
  • Implement idle session timeout.

Use safe and audited authentication libraries and monitor for vulnerabilities in dependencies

The security of libraries that are used as a dependency to build authentication functionality is also an important factor to consider. ​​For example, a vulnerability that allowed an attacker to completely bypass XML signature validation and pass off an altered file as a signed one with a carefully crafted XML file was discovered in the Go XML Digital Signature library. This library is used by many popular Go-based software programs for SAML authentication. Even Teleport was affected by this, which we fixed in the 4.1.11 release.

Use dependency vulnerability scanners such as npm audit, follow CVE advisories related to a programming language (e.g. .net CVE, python CVE) and maintain proactive practices for continuous monitoring of dependency vulnerabilities.

Design controls to prevent and contain logical flaws

Logical flaws can be hard to discover and may have a severe impact. A proper software design with a review from security engineers is the first step to avoid logical security flaws. Additionally, software developers must be educated on the common vulnerabilities related to authentication process and trained to prevent those vulnerabilities. The authentication cheat sheet series by OWASP is a great place to learn how to securely implement authentication functionality.

Implement two-factor authentication (2FA)

Two-factor authentication is probably the best way to improve the security of an authentication process. It is safe to say that a properly implemented 2FA method can help you prevent a severe vulnerability in the authentication process. But even the 2FA process can be vulnerable and can be bypassed if insecurely implemented. Below are a few ways to harden 2FA implementation.

  • Favor passwordless/PIN-less 2FA (e.g. U2F), over password/PIN-based 2FA (TOTP, SMS).
  • Ensure authenticated sessions are only created with a valid 2FA verification state stored on the server-side.
  • Enforce re-authentication to update 2FA settings.
  • Implement rate-limiting in failed 2FA.

2FA safeguards from compromised credentials and slows down or prevents automated attacks. So ensure that 2FA is enforced by default on every authentication process.

Implement mutual authentication

Mutual authentication involves authenticating both the connecting parties (client and server) and is best suited for API authentication and machine-to-machine authentication. Mutual authentication is also commonly used as an additional trust factor besides credentials such as passwords. Mutual authentication can be implemented with certificates and public-key infrastructure (PKI). Protocols such as SSH and TLS have built-in support for mutual authentication.

4. Protect against automated attacks

Implement rate limiters

Implementing rate limiters help to stop brute force attacks. A simple rate limiter that counts for failed authentication attempts and blocks users for a certain period can greatly enhance security and stop brute-force attacks. For API-based services, which usually handle high volume authentication requests, token bucket and leaky bucket algorithms are popular algorithms to implement rate limiters.


CAPTCHAs are a great way to slow down automated attacks. Although it is often annoying for genuine users to solve CAPTCHAs, it can be used in conjunction with rate limiters so that CAPTCHAs are only challenged to the users or machines who violate rate limit rules.

5. Harden password-based authentication

Although the general advice is to favor a passwordless solution, it is not an easy migration in many cases. The following are a few recommendations for securing password-based authentication.

  • Enforce strong password entropy. Password strength checkers such as zxcvbn can be helpful to implement strong entropy.
  • Do not ship software into production with default passwords.
  • Do not preset root passwords. Instead, build authentication logic that requires users to set passwords by themselves on their first login. For example, during account setup, generate a short-lived token that can be exchanged to set up passwords. As a reference, Teleport uses a similar token exchange method for user account setup.
  • Disallow using known passwords. This can be implemented by cross-checking with public password lists such as SecList common credentials or with services like haveibeenpwned.
  • Hash passwords before storing them in the database using secure password hashing algorithms such as Argon2, scrypt or bcrypt. To further enhance security, add salt and pepper to the hash values.

At Teleport, we regularly emphasize the value of passwordless solutions. To understand why passwords are bad, listen to our recent session with security visionary Troy Hunt - Lessons From Billions of Breached Records by Troy Hunt of https://haveibeenpwned.com.

6. Do not reinvent authentication methods

It's easy to write authentication functionality but harder to implement correctly. Standard specification certified libraries (e.g. OpenID Connect certified) and security audited libraries are a safer choice. It can be tempting to invent custom authentication protocols and use custom cryptographic algorithms to secure the authentication process, but this can be very risky and is not recommended.

Teleport cybersecurity blog posts and tech news

Every other week we'll send a newsletter with the latest cybersecurity news and Teleport updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.


The best recommendations to secure the authentication process are prioritizing passwordless authentication and implementing federated login or SSO with a two-factor authentication. Security considerations must be taken early on in the design process to implement controls that prevent logical flaws. Regular security audits are also equally important to test for logical flaws, and careful consideration must be placed in selecting libraries and dependencies for the authentication process.

Secure infrastructure authentication with Teleport

Teleport is an open-source project and helps implement passwordless authentication for infrastructure access. Passwordless authentication is based on certificates and can be used to authenticate against SSH servers, RDP servers, databases, Kubernetes clusters, and web applications. Learn more about how Teleport enables passwordless access to cloud infrastructure.

Try Teleport today

In the cloud, self-hosted, or open source
Get StartedView developer docs
Hacker NewsTwitter