﻿{"id":2636,"date":"2022-10-17T00:00:50","date_gmt":"2022-10-17T05:00:50","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=2636"},"modified":"2022-10-05T07:21:56","modified_gmt":"2022-10-05T12:21:56","slug":"le-savez-vous-quest-ce-que-lauthentification-multifacteur","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/le-savez-vous-quest-ce-que-lauthentification-multifacteur\/","title":{"rendered":"Le savez-vous? \u2013 Qu\u2019est-ce que l\u2019authentification multifacteur?"},"content":{"rendered":"\n<p>L\u2019authentification est le moyen par\nlequel on v\u00e9rifie l\u2019identit\u00e9 de la personne qui utilise un service.<\/p>\n\n\n\n<p>Pour authentifier un utilisateur, on peut\nutiliser trois grandes strat\u00e9gies.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/5-1-1024x277.png\" alt=\"\" class=\"wp-image-2637\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/5-1-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/5-1-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/5-1-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/5-1.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>La premi\u00e8re strat\u00e9gie est&nbsp;<strong>ce que\nl\u2019on sait<\/strong>. Celle-ci repose sur le fait qu\u2019un individu est en mesure de\ngarder un secret. <\/p>\n\n\n\n<p>Le facteur le plus connu de cette\ncat\u00e9gorie est le mot de passe. Ce dernier peut \u00eatre d\u00e9couvert s\u2019il est trop\nsimple. Il peut aussi \u00eatre vol\u00e9 par un logiciel malveillant ou un pirate\ninformatique lors d\u2019une intrusion ou d\u2019un piratage psychologique.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/6-1-1024x277.png\" alt=\"\" class=\"wp-image-2638\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/6-1-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/6-1-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/6-1-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/6-1.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Une autre strat\u00e9gie est&nbsp;<strong>ce que\nl\u2019on poss\u00e8de<\/strong>. Celle-ci repose sur le fait qu\u2019un individu dispose de quelque\nchose d\u2019unique qui peut \u00eatre identifi\u00e9. <\/p>\n\n\n\n<p>On retrouve dans cette cat\u00e9gorie un jeton\nphysique ou une application mobile sur lesquels sont affich\u00e9s des nombres qui\nchangent r\u00e9guli\u00e8rement. La carte d\u2019acc\u00e8s d\u2019un employ\u00e9 constitue un autre\nexemple. Ici, l\u2019un des enjeux est la perte potentielle du dispositif.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/7-1-1024x277.png\" alt=\"\" class=\"wp-image-2639\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/7-1-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/7-1-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/7-1-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/7-1.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>La derni\u00e8re strat\u00e9gie est&nbsp;<strong>ce que l\u2019on\nest<\/strong>. Celle-ci repose sur les \u00e9l\u00e9ments permettant d\u2019identifier un individu\net qui ne peuvent \u00eatre r\u00e9pliqu\u00e9s facilement. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/p>\n\n\n\n<p>Les empreintes\ndigitales, la voix, l\u2019iris, le visage en sont quelques exemples.&nbsp; Ces facteurs proviennent du domaine de la\nbiom\u00e9trie. Il s\u2019agit d\u2019une option qui n\u2019est pas toujours disponible en raison\nde l\u2019\u00e9quipement sp\u00e9cialis\u00e9 qu\u2019elle requiert.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/9-1024x277.png\" alt=\"\" class=\"wp-image-2640\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/9-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/9-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/9-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/9.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>En terminant,\nnotons que l\u2019utilisation de l\u2019authentification <strong>multifacteur <\/strong>est \u00e0\nprivil\u00e9gier lorsqu\u2019elle est disponible. Elle doit utiliser au moins deux\nstrat\u00e9gies diff\u00e9rentes pour diminuer les risques de contournement du processus\nd\u2019authentification.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"277\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-3-1024x277.png\" alt=\"\" class=\"wp-image-2641\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-3-1024x277.png 1024w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-3-300x81.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-3-768x208.png 768w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2022\/10\/8-3.png 1295w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>L\u2019authentification est le moyen par lequel on v\u00e9rifie l\u2019identit\u00e9 de la personne qui utilise un service. Pour authentifier un utilisateur, on peut utiliser trois grandes strat\u00e9gies. La premi\u00e8re strat\u00e9gie est&nbsp;ce que l\u2019on sait. Celle-ci repose sur le fait qu\u2019un individu est en mesure de garder un secret. Le facteur le plus connu de cette cat\u00e9gorie [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":2633,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4,10],"tags":[],"class_list":["post-2636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-campagne-de-sensibilisation"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=2636"}],"version-history":[{"count":2,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2636\/revisions"}],"predecessor-version":[{"id":2643,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/2636\/revisions\/2643"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/2633"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=2636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=2636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=2636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}