https://www.techtarget.com/searchsecurity/definition/multifactor-authentication-MFA
Multifactor authentication (MFA) is an IT security technology that requires multiple sources of unique information from independent categories of credentials to verify a user's identity for a login or other transaction. MFA combines two or more independent credentials -- what the user knows, such as a password; what the user has, such as a security token; and what the user is, by using biometric verification methods.
MFA aims to create a layered defense that makes it more difficult for an unauthorized person to access a target, such as a physical location, computing device, network or database. If one factor is compromised or broken, the attacker still has at least one or more barriers to breach before successfully breaking into the target.
In the past, MFA systems typically relied on two-factor authentication (2FA). Vendors increasingly use the label multifactor to describe any authentication scheme that requires two or more identity credentials to decrease the possibility of a cyberattack. Multifactor authentication is a core component of an identity and access management (IAM) framework.
One of the most significant shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. For example, techniques such as phishing, which trick users into revealing their account credentials in the guise of a security check or account update, remain a common attack method. Brute-force attacks are also a real threat, as bad actors can use automated tools to guess various combinations of usernames and passwords until they find the correct sequence.
Although locking an account after a certain number of incorrect login attempts can help protect an organization, hackers have numerous other methods for system access and carrying out cyberattacks. This is why a multifactor authentication process is so important, as it can help reduce security risks.
At the highest level, MFA requests additional credentials to validate a user's identity and allow access. For example, a user enters their username, password and other details uniquely generated in real time. The principal point here is that additional credentials are typically generated by the MFA platform and exchanged with devices deemed unique to or in the sole possession of the user.
Perhaps the most common type of MFA is the dynamic six-digit code that's sent to a device, such as a smartphone, associated with the user. The user receives the code and uses it to complete the access process. Since many smartphones include powerful integrated security features such as fingerprint or facial recognition, simply accessing the smartphone to receive the unique MFA code requires user authentication at the smart device as well. These factors combine to strengthen the confidence that access requests are coming from the intended user -- vastly improving application, data and account security.
In actual practice, MFA follows a well-established three-step process:
Some MFA implementations might only present an MFA challenge when requesting access for the first time on a new or previously unknown device, such as a different computer or tablet. Once accessed successfully, the MFA platform might forego further challenges when access requests arrive from a known device and rely on usernames and passwords only, or present MFA challenges to a known device only periodically.
The prevailing theory is that once a device is known through a successful MFA login, confidence in its validity is extremely high. This is an expression of the inheritance factor -- what something is -- and is a well-understood MFA authentication method. The exact application of MFA on known devices depends on how MFA technologies are implemented and configured.
An authentication factor is a category of credentials used for identity verification. For MFA, each additional factor is intended to increase the assurance that an entity involved in some communication or requesting access to a system is who -- or what -- it says it is. Using multiple forms of authentication can help make a hacker's job more difficult, which is why MFA techniques are used.
The three most common categories, or authentication factors, are often described as something you know, or the knowledge factor; something you have, or the possession factor; and something you are, or the inherence factor. MFA works by combining two or more factors from these categories.
Knowledge-based authentication typically requires the user to answer a personal security question. Knowledge factor technologies generally include passwords, four-digit personal identification numbers (PINs) and one-time passwords (OTPs). Typical user scenarios include the following:
To log in, users must have something specific in their possession, such as a badge, token, key fob or mobile phone subscriber identity module (SIM) card. A smartphone often provides the possession factor with an OTP app for mobile authentication.
Possession factor technologies include the following:
Typical possession factor user scenarios include the following:
Any biological traits the user has that are confirmed for login. Inherence factor technologies include the following biometric verification methods:
Authentication can also be inherited virtually when a successful login process is completed. For example, logging into a financial website using MFA can enable the user to opt out of further MFA logins on that device and browser because that point of access has already been validated. Such opt-outs can be permanent or allowed for limited periods such as 30-90 days, depending on specific IAM configurations and MFA requirements.
Biometric device components include a reader, a database and software to convert the scanned biometric data into a standardized digital format and compare the observed data's match points with stored data.
Typical inherence factor scenarios include the following:
User location is often suggested as a fourth factor for authentication. Again, the ubiquity of smartphones can help ease the authentication burden: Users typically carry their phones, and all basic smartphones have Global Positioning System tracking, providing credible confirmation of the login location.
Time-based authentication is also used to prove a person's identity by detecting presence at a specific time and granting access to a particular system or location. For example, bank customers can't physically use their automated teller machine (ATM) card in the U.S. and Russia 15 minutes later. These types of logical locks can help prevent many cases of online bank fraud.
Multifactor authentication (MFA) was introduced to harden security access to systems and applications through hardware and software. The goal was to authenticate users' identities and assure the integrity of their digital transactions. The downside to MFA is that users often forget the answers to the personal questions that verify their identity, and some users share personal ID tokens and passwords.
Other benefits and disadvantages of MFA include the following:
When authentication strategies were first introduced, the intent was to enforce security and keep it as simple as possible. Users were asked to supply only two security keys to inform a system that they were authentic and authorized users. Common forms of 2FA were user ID and password or ATM bank card and PIN.
Unfortunately, hackers quickly discovered ways to buy or break passwords or skim debit cards at ATMs. This prompted companies and cybersecurity vendors to look for more hardened forms of user authentication that used additional security factors for verification.
While MFA requires at least two authentication factors, if not more, 2FA only requires two. Therefore, 2FA is a subset of MFA -- all 2FA is MFA, but not vice versa.
Adaptive MFA is a security approach that chooses which authentication factors to apply to a user's login attempt based on business rules and contextual information. It's also referred to as adaptive MFA or risk-based authentication.
Traditional MFA uses set credentials and a second factor. Still, adaptive MFA is a bit more advanced. It automatically adapts authentication by considering several variables, such as user location, device being used, number of failed login attempts, user behavior and environment. This strategy makes it harder for hackers to gain unauthorized access because authentication is coordinated with the degree of risk.
For example, if a user attempts to access a corporate local area network from a known device, simple 2FA might be deemed sufficient. However, suppose the user possesses extended access privileges -- regardless of location -- because of their position in the company. In that case, if the login attempt is coming from a wide area network or an unknown device, or if there was an initial mistake in the username or password entry, the MFA system can adapt to pose additional challenges to validate the access attempt.
MFA products that use adaptive authentication can provide organizations with a more secure login experience. These tools use artificial intelligence to monitor user activity over time to identify patterns, establish user behaviors and detect abnormal behavior. They can adjust authentication requirements based on factors such as user location and recent login activity.
Although MFA implementation practices can vary by industry and specific business needs, the following best practices can potentially enhance the success and effectiveness of MFA technology:
Users might be reluctant to adopt MFA since it presents certain usability challenges, such as remembering several passwords to log in. Along with user resistance, there could be other obstacles with MFA, including integration problems. Consequently, the goal of MFA is to simplify authentication for users.
The following four approaches are being used to simplify MFA:
Cybersecurity is necessary for all organizations, but some businesses don't think it applies to them. Learn about several persistent security myths and how they can leave organizations vulnerable to cyberattacks.
28 Feb 2025