Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

This content has been archived and is no longer being updated.

Links may not function; however, this content may be relevant to outdated versions of the product.

Biometric Authentication

Updated on September 13, 2021

This presentation is part of the Authentication Overview Self-Study Course.

Transcript

Biometric authentication uses some characteristic of a person to prove their identity, such as their finger prints, the detail-rich intricate structures of a person’s iris, or the blood vessel patterns of their retina.  While suitable in limited application, biometric solutions may become unacceptably slow and comparatively expensive when a large number of users are involved.

Fooling a biometric system is surprisingly easy.  You can take a copy of a fingerprint with play dough and use it on the fingerprint scanner.  Biometric authentication is extremely vulnerable to replay attacks: once the information is compromised, it can easily be replayed unless the reader is completely secure and guarded.  If the biometric information has been compromised, there is no way to change it like you would a password.

And lastly, the owners of biometrically secured items may be in danger.  The value of the owner's finger is definitely greater than the value of the Mercedes it protects, at least to the individual whose finger it is.

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us