Multifactor Authentication Explained
posted by Anna Mar, June 07, 2013Multifactor authentication is the use of at least two different techniques to validate the identify of a person or entity.
For example, an authentication may ask a user for something they have (e.g. a bank card) and something they know (e.g. a password).
Definition: Multifactor Authentication
Multifactor authentication a technique for confirming the identity of a person or entity using at least two distinct methods.
Types of Authentication
There are 3 methods that can be used for multifactor authentication:- Something the user has
An object that the user physically possess such as a bank card or token. - Something the user knows
Something the users knows such as a password or their dog's name. - Something the user is
Examining the users themselves. For example, fingerprints or facial recognition.
Examples of Authentication
Multifactor authentication includes two or more challenges to validate the identity of users. These may include:- Usernames
- Account Numbers
- Email Addresses
- Passwords
- Challenge Response (what's your favorite movie?)
- Pattern (e.g. swipe pattern)
- Security Tokens (e.g. embedded in a phone or smartcard)
- Electronic Signature
- Fingerprint
- Signature (manual or digital)
- Face
- Voice
- Retinal Pattern
Two-factor Authentication (TFA, T-FA or 2FA)
Two-factor authentication is a multifactor authentication that uses two distinct methods of authentication.In many countries two-factor authentication is a regulatory requirement for certain industries such as banking.
IT Security Guide A guide to information security including cheat sheets, best practices and checklists. |
Recently on Simplicable
101 Game Design Principles for Social Mediaposted by Anna MarThe convergence of social media, software and gaming. |
Business Capability Mapposted by Anna MarThe most important diagram in all of business architecture — without it your EA efforts are in vain. |
101 Principles of Enterprise Architectureposted by Anna MarThis is the way to prove to your stakeholders that your recommendations are not just whims. |