https://www.techtarget.com/searchsecurity/tip/How-invisible-MFA-works-to-reduce-UX-friction
Multifactor authentication significantly enhances security by adding layers of protection that go beyond a simple username and password.
It's no surprise, then, that businesses are rapidly deploying MFA to enhance their security postures. The problem, however, is user resistance. People often find MFA inconvenient because it requires them to perform additional steps before they can access applications and digital resources.
Enter invisible MFA, a process that seeks to remove authentication hassles and reduce MFA fatigue, improving cybersecurity without damaging UX.
Let's learn more about invisible MFA, how it works and its business benefits, as well as potential implementation challenges.
Traditional or legacy MFA follows a now-familiar process. First, users enter their usernames and passwords. Once initial authentication is complete, MFA requires additional identification factors. In most cases, traditional MFA methods involve one or more of the following steps:
These manual user tasks are both tedious for the user and present phishing risks, as cybercriminals could intercept them. In contrast, invisible MFA's passwordless authentication process happens completely behind the scenes and uses authentication methods such as the following:
From the user's perspective, invisible MFA is simpler and more streamlined than traditional MFA. It is also phishing-resistant, as no passwords, codes or push notifications are in play for cybercriminals to intercept.
Behind the scenes, however, invisible MFA introduces additional technical complexity and takes significant time and effort to implement and maintain. For example, it requires proper collection and analysis of user and device data to inform accurate behavioral baselines.
Invisible MFA also carries a much higher risk of authentication errors. Minimizing the likelihood of false positives and negatives requires extensive fine-tuning of relevant data sets and algorithms.
While the terms are often used interchangeably, invisible MFA differs from frictionless MFA.
Like invisible MFA, frictionless MFA seeks to make MFA more user-friendly, in some cases by eliminating traditional password use. Unlike invisible MFA, however, frictionless MFA requires some degree of user participation in the MFA process. Its goal is to reduce -- but not necessarily eliminate -- the inconvenience users experience during authentication.
Frictionless MFA techniques include the following:
In many ways, frictionless MFA represents a happy medium between invisible and traditional MFA. For the user, it is more convenient than traditional MFA. And, behind the scenes, frictionless MFA carries a lower chance of false positives and negatives -- and requires less manipulation of existing data sets and algorithms -- than invisible MFA.
While invisible MFA can be technically complex to execute, it offers several key benefits, including the following:
Andrew Froehlich is founder of InfraMomentum, an enterprise IT research and analyst firm, and president of West Gate Networks, an IT consulting company. He has been involved in enterprise IT for more than 20 years.
Alissa Irei is senior site editor of TechTarget Security.
12 Aug 2024