Seeds of doubt: What resellers need to know about 2FA token seed data

A man using 2FA on his smartphone to access a service on his laptop
(Image credit: Shutterstock)

What is ‘seed data’ and why does it exist?

Seed data is the unique DNA that enables any form of two-factor authentication (2FA) to produce a unique passcode. It is a fundamental building block of any type of 2FA.

What should resellers know about seed records?

The manner in which seed data is set-up varies across different vendors. Most vendors ‘pre-seed’ hardware tokens, meaning the seed is planted into a token before it leaves the factory. This flies in the face of the central tenet of security – compartmentalisation – as it means multiple entities have access to the data, increasing the risk of a breach. Only a handful of vendors allow end-users to seed the tokens themselves, which means that only the end-users and the authentication server hold seed data records.

Who is responsible for keeping the seed data secure?

Responsibility for the seed data lies with whoever holds the data – or copies of it. In pre-seeded tokens, copies will be held by the vendor, the end-user, the authentication server and potentially the reseller, too. This makes all of them responsible for the data. In self-seeding tokens, the responsibility is limited to the end-user and the authentication server – the only two entities that really need to have access to it.

What are the implications of such data being lost/breached?

Once someone has access to the seed data, they have the ability to recreate the token. From there, all they would have to do in order to gain unfettered access to an organisation’s network is to get a hold of an individual’s username and PIN number. This is far easier to do than most people would ever suspect. Consequences can be tremendous for both the organisation being compromised – and the reseller responsible for procuring the solution.

ITPro

ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.

For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.

Latest in Security
Ransomware concept image showing a warning symbol in red with binary code in background.
Healthcare systems are rife with exploits — and ransomware gangs have noticed
Application security concept image showing a digitized padlock placed upon a digital platform.
ESET looks to ‘empower’ partners with cybersecurity portfolio updates
NHS logo displayed on a smartphone screen in white lettering on a blue background.
NHS supplier hit with £3m fine for security failings that led to attack
OpenAI logo and branding pictured at Mobile World Congress 2024 in Barcelona, Spain.
OpenAI announces five-fold increase in bug bounty reward
Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.
These five countries recorded the most third-party data breaches last year
Phishing concept image showing an email symbol with fishing hook.
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Latest in Feature
A photo of UNSW's Sunswift 7 car pictured in front of Uluru in Australia's Northern Territory.
How UNSW’s Sunswift Racing and Ericsson achieved cross-country connectivity in Australia’s outback
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
An abstract CGI image of a large green cuboid being broken in half with yellow, orange, and red cubes to represent ransomware resilience and data encryption.
Building ransomware resilience to avoid paying out
The words "How effective are AI agents?" set against a dark blue background bearing the silhouettes of flowchart rectangles and diamonds to represent the computation and decisions made by AI agents. The words "AI agents" are yellow, while the others are white. The ITPro Podcast logo is in the bottom right-hand corner.
How effective are AI agents?
An illustration showing a mouth with speech bubbles and question marks and a stylized robot alien representing an AI assistant chirping away with symbols and ticks, to represent user annoyance with AI assistants.
On-device AI assistants are meant to be helpful – why do I find them so annoying?