TechTarget.com/searchsecurity

https://www.techtarget.com/searchsecurity/definition/multifactor-authentication-MFA

What is multifactor authentication?

By Stephen J. Bigelow

Multifactor authentication (MFA) is an IT security technology that requires multiple sources of unique information from independent categories of credentials to verify a user's identity for a login or other transaction. MFA combines two or more independent credentials -- what the user knows, such as a password; what the user has, such as a security token; and what the user is, by using biometric verification methods.

MFA aims to create a layered defense that makes it more difficult for an unauthorized person to access a target, such as a physical location, computing device, network or database. If one factor is compromised or broken, the attacker still has at least one or more barriers to breach before successfully breaking into the target.

In the past, MFA systems typically relied on two-factor authentication (2FA). Vendors increasingly use the label multifactor to describe any authentication scheme that requires two or more identity credentials to decrease the possibility of a cyberattack. Multifactor authentication is a core component of an identity and access management (IAM) framework.

Why multifactor authentication is a must

One of the most significant shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. For example, techniques such as phishing, which trick users into revealing their account credentials in the guise of a security check or account update, remain a common attack method. Brute-force attacks are also a real threat, as bad actors can use automated tools to guess various combinations of usernames and passwords until they find the correct sequence.

Although locking an account after a certain number of incorrect login attempts can help protect an organization, hackers have numerous other methods for system access and carrying out cyberattacks. This is why a multifactor authentication process is so important, as it can help reduce security risks.

How MFA works

At the highest level, MFA requests additional credentials to validate a user's identity and allow access. For example, a user enters their username, password and other details uniquely generated in real time. The principal point here is that additional credentials are typically generated by the MFA platform and exchanged with devices deemed unique to or in the sole possession of the user.

Perhaps the most common type of MFA is the dynamic six-digit code that's sent to a device, such as a smartphone, associated with the user. The user receives the code and uses it to complete the access process. Since many smartphones include powerful integrated security features such as fingerprint or facial recognition, simply accessing the smartphone to receive the unique MFA code requires user authentication at the smart device as well. These factors combine to strengthen the confidence that access requests are coming from the intended user -- vastly improving application, data and account security.

In actual practice, MFA follows a well-established three-step process:

  1. Account creation. MFA starts when the user first creates an account with an employer or a third party, such as a banking institution. The traditional process of establishing a username and password remains virtually unchanged. When MFA is added or required, the user associates other elements to the account. Additional elements can include a hardware token or other physical device such as a smartphone. Virtual elements can readily include one or more verifiable email addresses -- often added for alerting and actions such as account recovery -- and an authenticator app such as Google Authenticator or Microsoft Authenticator.
  2. Access request. Access starts with a traditional username and password request; this is what the user knows. In many cases, this initial access request conveys information about the user's general geographic location and the device being used, such as its unique media access control address. If the initial login shows inconsistencies with the credentials or device, the user might receive an alert by email or text message. If the initial login is acceptable, the remote site connects to other elements for authentication and generates an MFA challenge for the user. For example, the MFA platform will send a unique, time-limited code by email or text, or request a response from the user's authenticator app; this is what the user has. In most cases, additional security is applied to access the MFA challenge. For example, a user might need to access their smartphone to retrieve the MFA code; this can represent what the user is.
  3. Assess response. The user receives the MFA challenge and completes the authentication process by verifying the MFA query. For example, they enter the unique code or press a button on a hardware fob. Once this additional authentication is validated, the user will be granted normal access.

Some MFA implementations might only present an MFA challenge when requesting access for the first time on a new or previously unknown device, such as a different computer or tablet. Once accessed successfully, the MFA platform might forego further challenges when access requests arrive from a known device and rely on usernames and passwords only, or present MFA challenges to a known device only periodically.

The prevailing theory is that once a device is known through a successful MFA login, confidence in its validity is extremely high. This is an expression of the inheritance factor -- what something is -- and is a well-understood MFA authentication method. The exact application of MFA on known devices depends on how MFA technologies are implemented and configured.

MFA authentication methods

An authentication factor is a category of credentials used for identity verification. For MFA, each additional factor is intended to increase the assurance that an entity involved in some communication or requesting access to a system is who -- or what -- it says it is. Using multiple forms of authentication can help make a hacker's job more difficult, which is why MFA techniques are used.

The three most common categories, or authentication factors, are often described as something you know, or the knowledge factor; something you have, or the possession factor; and something you are, or the inherence factor. MFA works by combining two or more factors from these categories.

Knowledge factor

Knowledge-based authentication typically requires the user to answer a personal security question. Knowledge factor technologies generally include passwords, four-digit personal identification numbers (PINs) and one-time passwords (OTPs). Typical user scenarios include the following:

Possession factor

To log in, users must have something specific in their possession, such as a badge, token, key fob or mobile phone subscriber identity module (SIM) card. A smartphone often provides the possession factor with an OTP app for mobile authentication.

Possession factor technologies include the following:

Typical possession factor user scenarios include the following:

Inherence factor

Any biological traits the user has that are confirmed for login. Inherence factor technologies include the following biometric verification methods:

Authentication can also be inherited virtually when a successful login process is completed. For example, logging into a financial website using MFA can enable the user to opt out of further MFA logins on that device and browser because that point of access has already been validated. Such opt-outs can be permanent or allowed for limited periods such as 30-90 days, depending on specific IAM configurations and MFA requirements.

Biometric device components include a reader, a database and software to convert the scanned biometric data into a standardized digital format and compare the observed data's match points with stored data.

Typical inherence factor scenarios include the following:

User location is often suggested as a fourth factor for authentication. Again, the ubiquity of smartphones can help ease the authentication burden: Users typically carry their phones, and all basic smartphones have Global Positioning System tracking, providing credible confirmation of the login location.

Time-based authentication is also used to prove a person's identity by detecting presence at a specific time and granting access to a particular system or location. For example, bank customers can't physically use their automated teller machine (ATM) card in the U.S. and Russia 15 minutes later. These types of logical locks can help prevent many cases of online bank fraud.

What are the pros and cons of MFA?

Multifactor authentication (MFA) was introduced to harden security access to systems and applications through hardware and software. The goal was to authenticate users' identities and assure the integrity of their digital transactions. The downside to MFA is that users often forget the answers to the personal questions that verify their identity, and some users share personal ID tokens and passwords.

Other benefits and disadvantages of MFA include the following:

Pros

Cons

Multifactor authentication vs. two-factor authentication

When authentication strategies were first introduced, the intent was to enforce security and keep it as simple as possible. Users were asked to supply only two security keys to inform a system that they were authentic and authorized users. Common forms of 2FA were user ID and password or ATM bank card and PIN.

Unfortunately, hackers quickly discovered ways to buy or break passwords or skim debit cards at ATMs. This prompted companies and cybersecurity vendors to look for more hardened forms of user authentication that used additional security factors for verification.

While MFA requires at least two authentication factors, if not more, 2FA only requires two. Therefore, 2FA is a subset of MFA -- all 2FA is MFA, but not vice versa.

What is adaptive multifactor authentication?

Adaptive MFA is a security approach that chooses which authentication factors to apply to a user's login attempt based on business rules and contextual information. It's also referred to as adaptive MFA or risk-based authentication.

Traditional MFA uses set credentials and a second factor. Still, adaptive MFA is a bit more advanced. It automatically adapts authentication by considering several variables, such as user location, device being used, number of failed login attempts, user behavior and environment. This strategy makes it harder for hackers to gain unauthorized access because authentication is coordinated with the degree of risk.

For example, if a user attempts to access a corporate local area network from a known device, simple 2FA might be deemed sufficient. However, suppose the user possesses extended access privileges -- regardless of location -- because of their position in the company. In that case, if the login attempt is coming from a wide area network or an unknown device, or if there was an initial mistake in the username or password entry, the MFA system can adapt to pose additional challenges to validate the access attempt.

MFA products that use adaptive authentication can provide organizations with a more secure login experience. These tools use artificial intelligence to monitor user activity over time to identify patterns, establish user behaviors and detect abnormal behavior. They can adjust authentication requirements based on factors such as user location and recent login activity.

Best practices for implementing MFA

Although MFA implementation practices can vary by industry and specific business needs, the following best practices can potentially enhance the success and effectiveness of MFA technology:

Addressing the challenges of multifactor authentication

Users might be reluctant to adopt MFA since it presents certain usability challenges, such as remembering several passwords to log in. Along with user resistance, there could be other obstacles with MFA, including integration problems. Consequently, the goal of MFA is to simplify authentication for users.

The following four approaches are being used to simplify MFA:

  1. Adaptive authentication. As described above, this approach applies knowledge, business rules or policies to user-based factors, such as device or location. For example, a corporate VPN knows it's OK for a user to sign on from home because it sees the user's location and can determine the risk of misuse or compromise. However, an employee who accesses the VPN from a coffee shop will trigger the system and be required to enter MFA credentials.
  2. SSO. This one-stop authentication method lets users maintain one account that automatically logs them into multiple applications or websites with a single ID and password. SSO establishes the user's identity and then shares this information with each application or system that requires it.
  3. Push authentication. This is an automated mobile device authentication technique where the security system automatically issues a third, single-use identification passcode or push notification to the user's mobile device. For example, users who want to access a secured system enter their user ID and password. A security system automatically issues a third, single-use identification code to their mobile device. Users enter that code into the system to gain access. Push authentication simplifies MFA by providing users with a third code, eliminating the need to remember it.
  4. Passwordless authentication. Passwordless authentication forgoes conventional passwords in favor of additional authentication factors such as hardware tokens or biometrics, including fingerprints and facial recognition. Remembering passwords is hard, so this makes it easier for users to authenticate and improves an organization's security posture, as most phishing attacks target password vulnerabilities for unauthorized access.

Cybersecurity is necessary for all organizations, but some businesses don't think it applies to them. Learn about several persistent security myths and how they can leave organizations vulnerable to cyberattacks.

28 Feb 2025

All Rights Reserved, Copyright 2000 - 2025, TechTarget | Read our Privacy Statement