OTP Authentication Explained: SMS, Apps, And Hardware Tokens

OTP (One-Time Password) Technologies Explained

Ready to start learning? Individual Plans →Team Plans →

OTP, two-factor authentication, cybersecurity, and IT security come together in one place every time a user enters a password and gets asked for a second code. That second code may arrive by SMS, email, authenticator app, or hardware token, and the choice matters more than most teams realize. If you are working through CompTIA ITF+ concepts or supporting basic identity controls on the job, understanding OTP technologies is part of the foundation.

Featured Product

CompTIA IT Fundamentals FC0-U61 (ITF+)

Gain foundational IT skills essential for help desk roles and career growth by understanding hardware, software, networking, security, and troubleshooting.

View Course →

OTP stands for one-time password, but that phrase covers more than one design. Some codes are usable only once, some expire after a short time, and some are delivered through channels with very different security profiles. The right choice depends on the risk of the action, the users involved, and the systems behind the login screen.

This article breaks down how OTPs work, where each type fits, and where the weak points are. It also compares SMS, email, TOTP, HOTP, push approvals, and hardware tokens so you can make a practical decision instead of a guess.

What OTPs Are and How They Work

An OTP is a temporary authentication code used to prove identity during login, transaction approval, password reset, or other sensitive actions. In many systems, the OTP is valid only for a short period and cannot be reused once it is accepted. That makes it stronger than a static password alone, because a stolen code is usually useless after the window closes.

There are two common models. The first is one-time use, where the code can be consumed only once. The second is time-limited, where the code expires after 30 seconds, 60 seconds, or another short window. Many implementations combine both: the server accepts the code only once and only during the allowed time span.

  1. The user enters a username and password.
  2. The authentication system generates an OTP.
  3. The OTP is delivered by SMS, email, app, or token.
  4. The user enters the code or approves the prompt.
  5. The server verifies the response and grants access if it matches policy.

That second step matters because it reduces the value of a stolen password. If an attacker captures a password through phishing or reuse, they still need the second factor. OTPs are common in banking, e-commerce, enterprise sign-in, and password reset flows because those are the places where identity proofing has to happen fast without a full re-enrollment process.

For a baseline security framework, the U.S. government’s guidance on MFA and identity assurance is worth reading alongside this topic. NIST’s digital identity guidance in NIST SP 800-63 is one of the clearest references for how authenticators are evaluated. For learners building foundational IT skills, this is the same kind of security thinking covered in CompTIA ITF+ when you connect identity, risk, and user support.

“OTP is not the end of the security conversation. It is a control that reduces risk, but the delivery method determines how much risk remains.”

Key Takeaway

OTP improves security because a password alone is no longer enough, but the channel used to deliver the code can weaken or strengthen the whole control.

The Main OTP Technologies

The main OTP families are SMS OTP, email OTP, TOTP, HOTP, push-based OTP, and hardware token OTP. Each one balances convenience, cost, security, and user friction differently. That is why there is no single “best” option for every environment.

Some methods are pure code delivery systems. Others are closer to approval workflows, where the user confirms a sign-in on a trusted device. Some rely on a shared secret and cryptographic math, while others rely on network delivery through telecom or email infrastructure. That difference is not cosmetic. It changes what an attacker has to compromise.

Method Main tradeoff
SMS OTP Easy to use, but vulnerable to telecom-based attacks
Email OTP Simple to deploy, but depends on inbox security
TOTP Better security, but requires an authenticator app and recovery planning
HOTP Works without time sync, but counter management is harder
Push approval Fast for users, but can be abused through fatigue attacks
Hardware token Strong and portable, but cost and logistics are higher

The best method depends on who is signing in and what they are signing into. A public consumer app may accept email or SMS for lower-risk verification. An admin console or regulated workload usually needs stronger controls. Cisco’s identity and security guidance, along with vendor documentation for multifactor options, is a useful reference point for enterprise design. See Cisco and Microsoft Learn for platform-specific MFA implementation patterns.

How OTP Technologies Differ

  • Delivery affects exposure. SMS and email travel over external systems; app-generated codes do not.
  • Verification affects usability. Entering a code takes longer than approving a push.
  • Recovery affects support cost. Lost devices drive help desk tickets.
  • Assurance affects risk. Not all OTP methods resist phishing equally.

When people ask which OTP is “best,” the right answer is usually: best for what risk, what user group, and what failure mode? That is the real decision.

SMS-Based OTP

SMS OTP works by generating a code on the server and sending it to a mobile number through the carrier network. The user receives the text message, enters the code on the login page, and the server checks it against the expected value. It is common because almost everyone understands text messages and does not need a special app.

That low friction is the reason many organizations still use SMS. There is no install step, no enrollment in an authenticator app, and very little training. For customer-facing systems, that can reduce abandonment during sign-up or account recovery.

The weaknesses are well known. SIM swapping lets an attacker take control of a victim’s phone number. SS7 interception can expose telecom traffic in certain scenarios. Malware on the device may read incoming messages. Number recycling also creates problems when a carrier reissues a number to a new owner. NIST has explicitly warned against overreliance on SMS for stronger authenticator use cases, which is one reason many security teams now prefer app-based methods. See NIST SP 800-63 for identity guidance.

Operationally, SMS has its own headaches. International delivery can cost more. Codes can arrive late or not at all if the user is in a weak coverage area. Some enterprise environments also discover that SMS delivery creates support tickets in regions with carrier filtering or travel restrictions.

Where SMS OTP Still Fits

  • Lower-risk verification for consumer accounts
  • Step-up authentication after unusual activity is detected
  • Fallback access when a primary factor is unavailable
  • Low-friction onboarding where adoption is more important than maximum assurance

SMS is not dead. It is just not the strongest choice when the action is sensitive. If a user is changing banking details or approving administrative access, SMS should usually be the backup, not the primary control.

Email-Based OTP

Email OTP sends a code, or sometimes a clickable verification link, to the user’s mailbox. The user opens email, retrieves the code, and enters it into the application. Because email is already part of most users’ daily workflow, this method feels simple and familiar.

The big advantage is reach. Almost every user already has an email account, and most organizations already manage email infrastructure. That makes deployment straightforward. It also avoids the carrier dependence that comes with SMS. For many low-risk workflows, email OTP is the fastest way to add a second verification step.

The problem is that email security is often weaker than teams assume. If the inbox is compromised, the attacker can capture codes directly. Malicious forwarding rules can silently redirect messages. Phishing can trick a user into reusing the code. Delivery delays also happen, especially when mail filtering is strict or the user’s mailbox is under load.

Email OTP should never be treated as secure by default. It depends heavily on the security of the mailbox itself. That means strong mailbox passwords, separate MFA on the email account, and monitoring for unusual forwarding rules. Microsoft’s identity documentation on MFA and account protection in Microsoft Learn is a practical starting point for organizations that rely on email for identity workflows.

Email OTP Versus SMS OTP

Factor Email OTP vs SMS OTP
Convenience Email is often easier for office users; SMS is easier for mobile-first consumers
Security exposure Email depends on inbox security; SMS depends on telecom and number control
Deployment Email is usually cheaper if the organization already runs mail services
Failure mode Email can be delayed or filtered; SMS can fail due to coverage or carrier issues

If the mailbox is already protected with strong MFA, email OTP can be acceptable for moderate-risk workflows. If the mailbox is weak, the OTP is weak too.

Authenticator App OTPs: TOTP and HOTP

Authenticator app OTPs are usually stronger than SMS or email because the code is generated locally from a shared secret rather than delivered over a public channel. The two major forms are TOTP, or time-based one-time password, and HOTP, or counter-based one-time password.

Both use the same general cryptographic idea. The app and the server share a secret key. Each side independently generates the same code from that secret plus either time or a counter value. No code has to travel through a phone carrier or email inbox before the user sees it. That removes several major attack surfaces.

Enrollment usually happens through a QR code or a manually entered secret key. After setup, the user opens an authenticator app, reads the code, and types it in. Good implementations also issue backup codes or alternate enrollment paths, because losing the device without a recovery plan creates a support problem fast.

  • Google Authenticator and Microsoft Authenticator are common examples of app-based OTP tools.
  • Some platforms also support built-in authenticators on the device itself.
  • Many enterprise systems offer backup codes during enrollment to support account recovery.

App-based OTPs are usually more secure than SMS or email because the secret never needs to transit carrier or inbox infrastructure. That is a major reason security-conscious teams prefer them. The tradeoff is that the user needs a managed device and a recovery plan. For help desk teams, that means fewer external delivery problems but more enrollment and recovery support.

For broader context on identity assurance and authenticator types, NIST’s digital identity guidance and vendor documentation from Microsoft Learn are both useful. The CompTIA ITF+ course aligns well with this topic because it builds the base concepts behind authentication, software, devices, and troubleshooting.

How TOTP Works in Practice

TOTP uses time as the moving input. The code changes every fixed interval, usually 30 seconds. Because both the server and the app know the shared secret and the current time, they can generate matching codes independently. In practice, this means the user gets a code that is valid only for a short window.

Time synchronization matters. If the user’s phone clock drifts too far from the server, the code may be rejected. To reduce false failures, many systems allow a small tolerance window, such as accepting the previous or next time step. That helps when clocks are slightly off, but it should not be so wide that stale codes remain usable for too long.

What the User Sees

  1. Open the authenticator app.
  2. Read the 6-digit code.
  3. Enter the code before it expires.
  4. Repeat at the next login or step-up prompt.

The user experience is simple once it is learned, but it breaks down when the device is lost, replaced, or migrated. That is why recovery codes matter. If the only second factor lives on one phone, a broken screen can become a business outage for the user.

Usability and Security Reality

TOTP is stronger than SMS, but it is not phishing-proof. If a user types the code into a fake site in real time, an attacker can relay it immediately to the real service and complete the login. That is why many teams now pair TOTP with login alerts, device trust, and risk-based checks rather than treating it as a complete answer.

“A time-based code is better than a text message, but it is still a code. If the attacker can trick the user in real time, the code can still be stolen and reused immediately.”

For platform guidance, Microsoft Learn documents authenticator enrollment and recovery patterns, while NIST SP 800-63 explains how time-based authenticators fit into assurance levels. Those references help separate what is convenient from what is actually resistant to attack.

How HOTP Works in Practice

HOTP uses a counter instead of time. Each code is generated from the shared secret plus a counter value, and the counter advances after each successful use or challenge. That means the code does not expire because the clock changed; it changes when the sequence advances.

The main benefit is reliability in constrained environments. If a device has poor time synchronization, or if the system operates offline for long stretches, HOTP can be easier to support than TOTP. That is one reason it still appears in legacy systems and some specialized hardware tokens.

The downside is synchronization management. If a user generates several codes without using them, or if the server and client get out of sync, the next code may fail. The system then has to “walk” the counter forward to resynchronize. That adds complexity to the server and to the help desk process.

HOTP Versus TOTP

  • Reliability: HOTP is less sensitive to device clock issues.
  • Complexity: HOTP is harder to keep synchronized at scale.
  • Adoption: TOTP is more common in modern consumer and enterprise deployments.
  • Legacy fit: HOTP still works well in controlled environments with older tokens.

In practical IT support, TOTP is usually the first choice because it is simpler for users and easier to standardize. HOTP remains useful where the environment demands it, but it is not the default modern pattern.

Push-Based OTP and Approval Authentication

Push authentication sends a notification to a registered device and asks the user to approve or deny the login. Some systems include extra context such as device name, browser, approximate location, or a risk score. The point is to make the user’s decision easier and the attacker’s job harder.

From a usability standpoint, push is attractive. The user does not have to open an app and type a code. They tap approve and move on. That speed makes push popular for mobile workflows and frequent sign-ins.

But push also creates a new weakness: MFA bombing, sometimes called push fatigue. Attackers spam approval requests until the user gets annoyed or confused and accepts one. That is why number matching and transaction details matter. If the prompt shows a number that must be matched, or if it displays meaningful context like the application name and location, the chance of blind approval drops.

Warning

Push approvals are vulnerable to fatigue attacks if users can accept prompts without verifying context. Use number matching, rate limits, and alerting to reduce that risk.

Best Practices for Push Authentication

  • Number matching so the user must enter or confirm a displayed number.
  • Transaction details such as app name, location, and device type.
  • Risk-based policy that blocks or escalates suspicious sign-ins.
  • Rate limiting to prevent repeated approval spam.

Push works well when users are trained and the application supports strong contextual checks. It is less suitable when the organization has a large population of users with limited mobile access or low security awareness. For deeper policy guidance, identity assurance frameworks from NIST and operational security reporting from the Verizon Data Breach Investigations Report are useful for understanding how social engineering actually plays out.

Hardware Tokens and Cryptographic OTP Devices

Hardware tokens generate or display one-time codes without depending on a phone or laptop. Some are simple displays that show a rotating code. Others are more advanced cryptographic devices that support challenge-response or stronger phishing-resistant flows. Either way, the token is separate from the primary workstation and often from the mobile ecosystem too.

The strengths are clear. Hardware tokens are portable, work offline, and can be harder for malware to intercept. They are especially useful when users cannot rely on phones, when the environment is tightly controlled, or when the organization wants a stronger factor for privileged access.

The drawbacks are just as clear. Tokens cost money. They must be distributed, tracked, replaced, and sometimes deactivated after loss. Users may forget them, and help desks must handle re-issuance. In large enterprises, the logistics can become the dominant issue rather than the technology itself.

Where Hardware Tokens Fit Best

  • Privileged admin access where compromise would be expensive
  • Regulated industries with tighter authentication requirements
  • High-security environments where phones are not trusted or not allowed
  • Offline or air-gapped workflows where network delivery is impossible

For compliance-oriented environments, hardware tokens often align better with strict policy than SMS or email. If you need a broader risk framework, pairing token deployment with ISO 27001 control thinking and NIST identity guidance is a sensible approach. The ISO 27001 overview is a useful reference for security management requirements that often influence authentication policy.

Security Strengths and Weaknesses of OTPs

OTPs improve security by making a stolen password insufficient on its own. That alone cuts down the value of credential stuffing, password reuse, and simple account takeover. It is one of the reasons two-factor authentication became such a common defense in cybersecurity and IT security.

But OTP is not the same as phishing-resistant authentication. If a code can be relayed in real time, an attacker can still trick the system. The risk depends on the method. SMS and email are easier to intercept through channel compromise. App-based codes are harder to steal passively but still usable by a live phishing proxy. Push approvals can be abused through fatigue. Hardware tokens are stronger, but not immune to poor process or loss.

Common Attack Vectors

  • Phishing and reverse proxy attacks that relay OTPs in real time
  • SIM swap and number takeover for SMS delivery
  • Malware that reads messages or steals session data
  • Social engineering against users or help desk staff
  • Device compromise that exposes email or authenticator app access
  • Account recovery abuse where the fallback process is weaker than the login flow

Layered controls matter here. Rate limiting slows guessing. Anomaly detection helps flag impossible travel or unusual device patterns. Session binding ties the OTP result to the specific browser or transaction. The more context the server checks, the less useful a stolen code becomes.

“An OTP reduces password risk, but the account recovery path is often the real weak point.”

For additional threat context, MITRE ATT&CK and the CISA guidance on phishing-resistant authentication offer strong, practical insight into how attackers bypass basic controls. The important lesson is simple: OTP is a mitigation, not a complete identity strategy.

OTP Best Practices for Businesses

Good OTP policy starts with risk. Use stronger methods for administrative access, finance systems, and sensitive customer actions. Use simpler methods only when the risk is low and the user population can tolerate them. That is the basic rule, and too many deployments get it backwards.

App-based or hardware-based methods should be the default for higher-risk access. SMS should be treated as fallback, not first choice, unless there is a business reason that outweighs the risk. Email OTP can work when mailbox security is already strong and monitored.

Recommended Control Set

  1. Require secure enrollment with identity verification.
  2. Set short code expiration and limit retry attempts.
  3. Use adaptive authentication and geolocation checks.
  4. Enable login alerts and admin audit logs.
  5. Provide recovery codes and a documented reset process.
  6. Monitor for repeated failed logins and OTP abuse patterns.

It is also worth making the second factor visible in incident response. If a user reports suspicious OTP prompts or unexpected text messages, that may indicate targeted phishing or account takeover. Support staff should know how to freeze authentication, review recent sign-in events, and verify recovery steps before restoring access.

Note

Secure enrollment and recovery are just as important as the OTP method itself. Many breaches happen because the fallback process is weaker than the login control.

For policy and workforce alignment, CISA guidance, NIST authentication standards, and organizational controls from ISO 27001 are all relevant. They help translate “use MFA” into an operational process that actually survives contact with users and attackers.

Common Implementation Challenges

OTP rollouts fail for familiar reasons: users get confused, support teams get overloaded, and the recovery process is too weak or too strict. The technology is usually not the main problem. The surrounding process is.

One of the most common issues is adoption friction. Users lose phones, change numbers, replace devices, or forget how they enrolled. If the organization did not plan for backup enrollment and recovery codes, the help desk becomes the workaround. That adds cost and slows sign-in for legitimate users.

Integration is another pain point. OTP has to work with SSO, IAM platforms, legacy applications, and custom flows. Older systems may not support modern MFA APIs, which forces creative bridging that can introduce new failure points. If the organization also has accessibility requirements, the OTP flow must be tested for screen readers, mobile compatibility, and network latency.

Operational Problems to Watch

  • Code delays from SMS or email delivery
  • Synchronization errors for TOTP and HOTP
  • Lost second factors when a device is replaced
  • Privacy concerns around phone numbers, emails, and metadata
  • Legacy application limits that force exceptions

Testing should include browsers, devices, time zones, network interruptions, and failover scenarios. If a system works only on one corporate phone model with one browser and one office network, it is not ready. That is especially true in environments that handle regulated data or have a distributed workforce.

For broader implementation metrics and labor impact, the U.S. Bureau of Labor Statistics is useful for understanding how identity and support skills fit into IT roles, while the U.S. Department of Labor provides context on workplace obligations and technical training expectations.

How to Choose the Right OTP Method

The right OTP choice is a decision framework, not a brand preference. Start with security need, then check user convenience, device availability, cost, and how much support the organization can actually absorb. A method that looks strong on paper can fail in production if users cannot recover from loss or if the help desk cannot support it.

Decision Framework

  1. Identify the risk of the action: low, medium, or high.
  2. Check user context: mobile access, email access, global coverage, accessibility needs.
  3. Review operational maturity: enrollment, recovery, logging, and incident response.
  4. Match the method to the risk level.
  5. Pilot first with a small user group before organization-wide rollout.
Scenario Best fit
Low-risk consumer account Email OTP or SMS OTP with risk checks
Mid-risk enterprise access TOTP or push with number matching
High-risk admin workflow Hardware token or stronger phishing-resistant method, with OTP as fallback

TOTP is usually preferable to SMS because it avoids telecom interception and number takeover issues. Hardware or push-based authentication becomes more attractive when the user base can support it and the workflow justifies the added protection. For globally distributed users, offline support and device migration become more important than people expect.

CompTIA ITF+ is relevant here because it teaches the kind of practical thinking behind this choice: how hardware, software, networks, and security controls interact. That base knowledge helps you select an OTP method that fits real users, not just policy language.

The Future of OTP Technologies

OTP is not disappearing, but it is no longer the end state. The industry is moving toward passkeys and FIDO-based authentication, which are designed to be more resistant to phishing and code relay attacks. Those methods reduce reliance on shared secrets and one-time codes in the login path.

Even so, OTP will remain relevant. It works as a fallback for account recovery, as a transitional control during migration, and as a compatibility option for systems that cannot yet support stronger methods. That makes OTP more of a bridge than a destination.

Expect more hybrid approaches. A workflow may use a passkey for normal access, an OTP for backup verification, and a push or device-binding step for risk escalation. Risk-based authentication will continue to mature, with systems adjusting requirements based on location, device trust, sign-in behavior, and transaction sensitivity.

What Will Change Most

  • More segmentation by risk instead of one factor for every user action
  • Better device binding to reduce code relay abuse
  • Stronger recovery flows that do not rely on weak fallback questions
  • More phishing-resistant options for privileged and high-value accounts

The practical forecast is straightforward: organizations will use OTP less as the primary answer and more as a compatibility layer. That is a sensible direction because it keeps authentication usable while reducing the number of places where a plain code can be stolen or relayed. For a current industry view of security trends, the Gartner security research perspective and the IBM Cost of a Data Breach Report both reinforce the cost of weak identity controls.

Featured Product

CompTIA IT Fundamentals FC0-U61 (ITF+)

Gain foundational IT skills essential for help desk roles and career growth by understanding hardware, software, networking, security, and troubleshooting.

View Course →

Conclusion

OTP technologies solve a real problem: passwords alone are not enough. But the different OTP methods are not equal. SMS OTP is easy and familiar, email OTP is simple to deploy, TOTP is stronger for everyday use, HOTP fits certain legacy or offline cases, push authentication improves convenience, and hardware tokens provide stronger isolation at a higher operational cost.

The right choice depends on the risk of the action and the support burden you can handle. For most organizations, the best pattern is to use the least risky OTP method that still fits the user experience and security requirements. Reserve SMS and email for lower-risk or fallback cases. Use app-based or hardware-based methods where the consequences of account takeover are higher.

If you are building your foundation in IT security, this is the practical lesson to keep in mind: the authentication control is only as strong as the channel, the recovery process, and the user behavior around it. That is why CompTIA ITF+ concepts matter. They help you understand not just how OTP works, but how it fits into real support, troubleshooting, and security decisions.

Review your current authentication flow, identify the weakest factor, and replace it with the strongest option that users can realistically adopt. That is the step that improves security without breaking operations.

CompTIA® and Security+™ are trademarks of CompTIA, Inc.

[ FAQ ]

Frequently Asked Questions.

What is an OTP and how does it enhance security?

OTP, or One-Time Password, is a unique code generated for a single session or transaction. It enhances security by ensuring that even if a password is compromised, the attacker cannot reuse the OTP for subsequent access, reducing the risk of unauthorized entry.

Typically, OTPs are used in two-factor authentication (2FA) systems, requiring users to provide both their regular password and the one-time code sent via SMS, email, or an authenticator app. This layered approach significantly improves cybersecurity defenses and helps protect sensitive data and systems from breaches.

What are the common methods of delivering OTPs to users?

OTPs can be delivered through several methods, each with its own advantages. The most common channels include SMS text messages, email, authenticator apps, and hardware tokens. These options allow flexibility depending on the security requirements and user convenience.

Authenticator apps generate OTPs locally on a device, providing an offline method that does not rely on network connectivity, while hardware tokens are physical devices that generate or display OTPs. Choosing the right delivery method depends on factors like security sensitivity, user environment, and infrastructure capabilities.

Are OTPs vulnerable to any security threats?

While OTPs significantly improve security, they are not entirely immune to threats. Common vulnerabilities include interception during transmission, such as via SMS or email, phishing attacks targeting users to reveal their OTPs, and malware that can capture OTPs stored on or entered into compromised devices.

To mitigate these risks, organizations should implement additional security measures such as encrypted communication channels, user education on phishing, and hardware tokens for high-security environments. Combining OTPs with other security controls further strengthens the overall cybersecurity posture.

What are best practices for implementing OTP in an organization?

Effective OTP implementation involves selecting secure delivery methods, such as hardware tokens or authenticator apps, and enforcing strict policies around their use. Regularly updating and managing OTP systems ensures they remain secure and functional.

Organizations should also educate users on the importance of safeguarding their OTPs, avoid sharing codes, and recognize phishing attempts. Additionally, integrating OTP with other multi-factor authentication (MFA) solutions enhances overall identity verification and access control strategies.

How does OTP technology support compliance and regulatory requirements?

Many regulatory frameworks and industry standards mandate strong authentication measures, including OTP-based two-factor authentication, to protect sensitive information. Implementing OTP technologies helps organizations meet compliance requirements related to data security, privacy, and access controls.

By adopting OTP solutions, companies demonstrate their commitment to cybersecurity best practices, reduce the risk of data breaches, and facilitate audits and assessments. Properly deployed OTP systems also support risk management strategies by providing an additional layer of identity verification.

Related Articles

Ready to start learning? Individual Plans →Team Plans →
Discover More, Learn More
Dynamic Routing Protocols: Link State vs Distance Vector Explained Discover the key differences between link state and distance vector routing protocols… Enhance Your IT Expertise: CEH Certified Ethical Hacker All-in-One Exam Guide Explained Discover essential insights to boost your cybersecurity skills and confidently prepare for… CISSP vs CISM : Key Differences and Similarities Explained In the dynamic and ever-changing world of cybersecurity, the debate around which… CompTIA Security: Technologies and Tools (3 of 7 Part Series) Discover essential security technologies and tools to enhance your understanding and practical… Where to Learn How to Code : How to Code for Beginners Explained Discover essential resources and strategies to learn how to code effectively, empowering… CompTIA Exams : CompTIA A+, Network+, Security+ and More Explained Introduction Navigating the landscape of IT certifications can feel like walking through…