Podcast
Root Causes 220: The Difference Between OTP and Passwordless


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
May 2, 2022
"Passwordless" is a hot term in the industry, and as a result many technology vendors are attaching their solutions to this term. In this episode we clarify the difference between OTP services and passwordless authentication.
Podcast Transcript
Lightly edited for flow and brevity.
Part of what we said in this podcast in the past, Tim, is that there seems to be some wide-ranging opinions about what passwordless is. Not many people haven’t talked about what it really isn’t, and this is an area that I really do want to talk about. And we have talked about things like very, very large, complicated password managers that are kind of acting like passwordless.
But in the case of a 2FA OTP, it is a way second factor, and I suppose there’s no rule that says the first time factor has to be a shared secret, but pragmatically, it always is. So, that’s why I’m a little confused.
So the actual physical typing in of a password is being done by something else, and there may not even be a change in the legacy form. It’s merely something filling in the form for you. You have to then finish off the authentication by using the OTP challenge going to your phone of whatever other mechanism you’re being asked to look at.
The second one is similar, but it’s in the Single Sign-On scenario, which is - there are I believe some vendors who will – they’re kind of specialists in Single Sign-On, and that’s great, or it’s something that’s a part of what they’re offering, and because of the fact that the Single Sign-On is taking care of the password entry, all you have to do is make sure you do the second factor challenge correctly to authenticate the fact that you’re not having to enter that password every single time. Some of those types of technologies are now also being called passwordless. Even though, of course, there is an underlying password in both of what I just talked about.
Here’s my final point, and then I’ll give it back. I’ve been in rooms with extremely stressed out people who were responsible for security of enterprises. You could just tell that their job was hard, and they weren’t given enough resources, and here I was as just another vendor trying to either (a) create fear or (b) try to invent something new that was old, and, what I find interesting is that what a lot of those people had in common was a defeatist attitude that was so bad that they actually tried to downplay the risks that they were facing. Therefore, when you start to get really, really cynical about a term like passwordless, because of the reasons we just talked about, please, please, like, what to do with that is put your money, put your next piece of effort into the right thing for your organization, but for heaven sakes don’t let a defeatist attitude and don’t let a cynicism about the way that marketing sometimes, unfortunately, will work stop you from making the right decisions and see the risks that you face very, very clearly. Because if I trace my experiences talking to enterprises and my experiences in that world for many years, I’m still not seeing entirely correct emphasis on certain kinds of risk, and some of it is because of arguments about technology, but some of it now is just purely coming out of cynicism, Tim, and I think this is part of where it’s coming from, and you know what, maybe it’s time for us all to just sit down together again and have a conversation about what are we missing here, and from the vendor side and from the procurement side. Because I think we’ve got a lot of work to do. The bad guys have had it too easy for too long, and there are some very unfortunate circumstances that have caused that. It’s time to get over it, guys.

