MFA: Fast Facts and What You Need to Know - Identity Review - Identity Review | Global Tech Think Tank

Multi-Factor Authentication Basics 

Multi-Factor Authentication (MFA) is an authentication technique that requires users to have 2+ verification tools to gain access to an account, application or VPN (virtual private network). This is a common component of identity access management policies. Access management systems allow companies to manage several types of identities such as humans, hardware, software and even IoT devices. 

Traditionally, systems simply ask for a username and password. But usernames and passwords are often subject to brute force attacks—when hackers use an excessive trial and error process to guess possible username and password combinations of a login. MFA asks for other credentials, decreasing the chance of a security breach. For instance, a user name, password, a pin from a security application on a cellphone and a fingerprint scan could be combined to form an MFA chain.

How it Works 

MFA: Fast Facts and What You Need to Know

MFA is driven by several types of verification information, otherwise known as factors. One time passwords are common within the MFA process. These passwords are typically 4-8 digit codes that users will receive through email, SMS or a mobile authentication app. The codes are valid for a specific time frame and will reset after every authentication request. Moreover, the codes are created from an assigned value associated with each user when they register, alongside a certain time value that will vary based on the system. 

Many MFA methods are based on three specific types of information. 

  1. Things you know (knowledge): password or PIN or answers to security questions
  2. Things you have (possession): access badge, cellphone, one time passwords 
  3. Things you are (inherence): fingerprint, iris scanning, other biometrics

Location-based MFA and adaptive authentication are also valid forms of verification.

Location-based MFA will utilize the user’s IP address and potentially their physical location. Often, this information is used to see if a user’s location is on a company’s whitelist, but could also be used along with one time passwords (OTPs) and/or other factors. Adaptive authentication, or risk-based authentication, will consider user behavior during the security checking process and determine a risk level associated with that user. Some questions used under the adaptive MFA framework include:

  • What device is trying to gain access? Is it different from recent patterns? 
  • Is the connection private or public? 
  • What time is the user trying to authenticate? 

MFA vs Two-Factor Authentication (2FA)

Two-Factor Authentication is a subcategory of MFA. It is widely used for digital banking, social media and e-commerce. Consumers commonly encounter 2FA when withdrawing money from an ATM—here, a user inputs a debit card (a factor the user possesses), along with a PIN (a factor the user knows) to successfully gain access. 2FA follows the same factors as MFA (knowledge, possession, inherence), but chooses two instead of multiple. 

Other Common Authentication Methods 

Single Sign On (SSO) is another common authentication technique that allows users to gain access across multiple applications or websites with a single set of credentials. The SSO framework is based on a trust certificate between the service provider and identity provider. This certificate is typically composed of identifying pieces of information about a user, such as a username or email, ensuring the information being sent to the service provider is from a secure source. The steps of SSO are typically as follows: 

  1. A user navigates to the website they want to gain access to (service provider)
  2. The service provider sends the certificate that holds a user’s email address or username to the identity provider to authenticate themselves 
  3. The service provider will check if the user has already been authenticated. If the user has previously logged in, then the service provider will send back a token authentication to the user 
  4. If the user has not logged in before, they will be prompted to provide further information such as an OTP
  5. Once the credentials are deemed valid and have been processed, the user will receive a token, allowing them to access the service. 

Likewise, Challenge Handshake Authentication Protocol (CHAP) is a method that verifies a user to a network with 3-way encryption. First, the network router sends a “challenge” to the remote host, which will send back a response with MD5 encryption. The network router examines the response and if it matches the hash value, it will authenticate the connection. This is more secure than the traditional username and password as the network can send a “challenge” at any point, while usernames/passwords are only used during initial authentication. 

Do you have information to share with Identity Review? Email us at press@identityreview.com.

Get Involved with
Identity Review
Consortium.

Connect with us

Keep up with the digital identity landscape.

Apply to the Consortium

Bringing together key partners, platforms and providers to build the future of identity.

Apply
Submit a Press Release

Be a Guest Writer

Want to write as a guest writer for Identity Review? Send us your pitch or article.

Submit
Picking an Identity Solution?

Picking an Identity Solution?

Make an informed decision on the right provider from in-depth reviews and feature comparisons.

Reviews