MFA increases security because even if one authenticator becomes compromised, unauthorized users will be unable to meet the second authentication requirement and will not be able to access the targeted physical space or computer system.
When MFA is implemented, it makes it more difficult for a hacker to gain access to business premises and information systems such as remote access, email, billing systems, even if passwords or pins have been compromised.
Password cracking techniques are becoming more sophisticated and high-powered commuting is increasingly affordable. Hackers have the ability to harvest credentials through phishing emails or by identifying passwords reused from other systems. Multi-factor authentication adds that extra layer of security for maximum protection.
MFA requires users to present two or more authentication factors at login to verify their identity before they are granted access. Each additional authentication factor a user has adds to the login process increases security.
A typical MFA login requires the user to present some sort of combination of the following:
You might want to consider enforcing MFA on Internet-facing systems such as email, remote desktop, and Virtual Private Networks (VPNs).
The most common authentication factors are described as something we know (knowledge factor), something we have (possession factor), or something we are (inheritance factor). MFA works by combining two or more factors from these categories.
Knowledge based authentication requires the user to answer a personal security question. Knowledge factor technologies include passwords, four-digit personal identification numbers (PINs) and one-time passwords (OTPs).
Typical user scenarios include the following:
Users must have something specific in their possession in order to log in. This could be a hardware token, security key, a key fob, or even a SIM Card. In terms of mobile authentication, a smartphone often provides the possession factor in conjunction with an OTP app.
Typical possession factor user scenarios include the following:
Any biological traits the user has are confirmed for login. Inherence factor technologies include the following Biometric verification methods:
Biometric device components include a reader, a database and software to convert the scanned biometric data into a standardized digital format and to compare match points of the observed data with stored data.
Typical inherence factor scenarios include the following:
Multi-factor authentication is used to harden the security access to systems and applications through a special type of software. The goal of MFA is to authenticate the identity of users and to assure the integrity of their digital transactions. One of the downsides to MFA is that users tend to forget the answers to the personal security questions to verify their identity and some users tend to share personal ID tokens or passwords.
Here are some pros and cons to MFA for you to consider:
When authentication strategies were first introduced, the ultimate intent was to enforce security in the most simple way possible. Users were simply asked to provide only two forms of security identification keys that would then inform the system that they were who they said they were.
Nowadays, because there are more data breaches occurring, and lots of companies hosting remote workers, there needs to be more than just 2FA implemented. Two-factor authentication, while a strong form of authentication, can still be bypassed. For example, common forms of 2FA are user ID and password, ATM’s, and bank card and PIN. While yes, these are secure, the combinations of username and passwords and ATM PINs can easily be tracked and stolen.
MFA on the other hand, is the stronger form of authentication simply because there is an extra layer of protection that 2FA doesn’t have. Hackers have quickly discovered ways to break or buy passwords, or even skim credit cards at ATMs. This prompted many companies and security vendors to look for a more hardened form of authentication that used an additional authentication method.
As with anything, MFA does have its challenges. By adding security factors to MFA, it further complicates ease of use for users who must remember multiple passwords. The goal of MFA is to simplify MFA techniques for users.
Here are three approaches being used to simplify MFA:
This applies knowledge, business rules or policies to user-based factors, such as device or location. For example, if a user was working remotely from their house, the corporate VPN knows that it is OK for the user to sign on from home because it sees the location and can determine the risk of misuse or compromise. But a user who accesses the VPN from a coffee shop will trigger the system and be required to enter MFA credentials.
This one-stop authentication method enables users to maintain one account that automatically logs them in to multiple applications or websites with a single ID and password. Single-sign-on works by establishing the user’s identity and then sharing this information with each application or system that requires it.
This is a mobile device authentication technique where the security system automatically issues a third, single-use identification code to the user’s mobile device. For example, users who want to access a secured system enter their user ID and password and a security system automatically issues a third, single-use identification code to their mobile device. Users enter that code into the system to gain access. Push authentication simplifies MFA by providing users with a third code, eliminating the need to remember it.
MFA increases security because even if one authenticator becomes compromised, unauthorized users will be unable to meet the second authentication requirement and will not be able to access the targeted physical space or computer system.