SlideShare a Scribd company logo
1 of 14
Download to read offline
What Is Two-Factor or
Multi-Factor
Authentication?
Traditional password-and-username authentication can leave users
vulnerable. In 2010 ​Christopher Chaney​, a celebrity obsessed cyber-stalker,
got hold of a number of celebrity emails. Using data gleaned from social
media and Wikipedia, he successfully guessed the passwords to over 50
personal email accounts belonging to famous women, including Scarlett
Johansson, Mila Kunis, and Christina Aguilera. He had access to these
accounts for almost a year, and he was responsible for posting nude photos
of Scarlett Johanssen and several non-celebrity women. He has since been
sentenced to 10 years in jail.
Almost everyone’s email address has been exposed online somewhere
(luckily there are​ ways to find out​ if this has happened). And traditional
password-based authentication is inherently insecure. Given these two facts,
it’s essential to offer customers additional ways to protect their accounts.
Two-factor or multi-factor authentication (2FA or MFA) is an extra
authentication method that’s becoming increasingly common. But just what
are 2FA and MFA, and how can they help protect your customers?
What Is Multi-Factor
Authentication?
The only difference between multi-factor authentication and two-factor
authentication is that 2FA only uses two of the available additional checks to
verify customer identity, whereas MFA may use three or more checks.
More checks mean more security, but customers can find them onerous, so
it’s wise to choose the number of extra checks based on both the minimum
security level suitable for that service or account, and the frequency and
proximity to other verification checks.
If customers repeatedly have to go through multiple checks on their
customer journey, they will soon become frustrated and drift away to your
competitors. Of course, if you lose their data, they will also be someone
else’s customer soon enough.
Using multi-factor authentication as part of your customer identity and
access management (CIAM) platform helps you build and maintain a solid
customer opinion as the world evolves towards ​industry 4.0​.
What Types of Multi-Factor
Authentication Are There?
There are a number of different checks you can use to implement MFA, and
this list is always growing. When choosing which checks to use, take into
account things like the level of security needed, the types of technology
most often used by your customers to access your assets, and, to some
extent, cost.
SMS token
A relatively straightforward measure to implement, especially for consumers
and the general public, this check most often consists of a text message
containing a PIN number. This PIN is then used as a one-time password
(OTP), usually in addition to traditional username-and-password verification.
If your customers frequently access ​your services from mobile devices​, it’s
wise to offer them this or another mobile-device-based authentication
method to help smooth the customer journey.
Email token
This method is Identical to SMS tokens, but the code is sent via email. Since
not everyone has their phone with them all the time, it’s a good idea to offer
this option. It can act as a backup method if your customer has had their
mobile device lost or stolen. It’s also a convenient way to access an OTP
from any platform that can receive email.
Hardware token
Using a separate hardware token is considered one of the most secure
authentication methods available, as long as the key remains in the
customer’s possession. This method is more expensive, although it can be
cost-effective to provide your high-value customers with dongles for free.
Business customers tend to be more willing to go the extra mile to use a
hardware token, and adoption of ​hardware tokens is increasing​. But it’s still
not a good idea to make them compulsory for anyone but the most
high-value, at-risk customers such as banking, insurance, and investment
clients.
Users just need to insert the hardware token into their device to use it. If
they use a mobile device for access, they may need another dongle to add a
USB or USB-C port to their smart device.
Software token
By using an authentication application on a mobile device, you can get
almost the same level of security as with a hardware token. Essentially, the
smart device becomes the token. This can be tied in with services like
Google Authenticator.
Getting customers to use a third-party solution can help encourage them to
use MFA for more of their services outside of your business, thus increasing
their overall security. It also makes a great alternative to carrying an
additional dongle to attach a hardware token to a smart device.
Phone call
Another way to get a one-time password is via automated phone call.
Biometric verification
People with a smart device or computer with biometric authentication (such
as fingerprint ID or facial recognition) can use this check to confirm their
identity as part of MFA. ​Biometric ID verification ​tends to be less hassle than
typing in an OTP, so customers find it less aggravating to use it frequently.
The lower friction makes it an ideal option when extra checks are
unavoidable.
Other forms of multi-factor
authentication
There are a few other digital verification methods available to your
customers.
Social login​, also called social identity verification, is something many users
find convenient, since they’re usually already logged in to the relevant
accounts. Bear in mind though that social media platforms are high-value
targets for hackers, so social ID verification shouldn’t be the only method
used on top of username/password in most cases.
Security questions​ are a type of knowledge-based authentication (KBA)
where the questions and answers are static. The questions could be defined
by the business or the customer, and the customer provides the answers
that are later verified. Dynamic KBA, which is more secure than static KBA,
uses questions that are generated in real-time based on data records such
as credit history or transactions.
Risk-based authentication (RBA) can also be used in conjunction with MFA.
By monitoring things like location, device, and even user keystrokes, you
can tailor the frequency of MFA checks to the security situation. RBA helps
avoid asking customers for extra verification repeatedly when they’re signing
in from their “home” machine and location.
How Secure Is MFA?
The security of your ​MFA solution​ depends on a few different things. First of
all, you need engaged, willing customers to apply the above solutions. As
mentioned earlier, hardware keys offer greater security than social
verification, but they cost money and effort to use.
It’s also important to make sure your MFA set up follows a few basic security
steps:
● Make sure that new users can’t set up MFA the first time they log in.
An attacker with a valid password could steal the account and set up
MFA with their choice of phone number.
● Make sure automated phone calls use clear messages that let the user
know someone is trying to log in.
● Educate customers about their chosen MFA methods; make sure they
know what to do and who to contact if there is an issue.
● Don’t allow high-value, high-risk clients to authenticate with less
secure MFA methods like social verification.
● Make sure you use multi-factor authentication rather than two-factor
authentication. 2FA with SMS and username/password for the two
factors is increasingly vulnerable to ​SIM swapping​.
At the end of the day, no system is ever 100% secure. What MFA does is
protect your customers from all but the most determined hackers, and it
protects them many thousands of times better than username/password
alone.
What Is ​Adaptive​ Multi-Factor
Authentication?
Adaptive MFA is a method that your CIAM provider uses to apply the right
level of authentication security depending on the risk profile of the actions
currently being attempted by the customer. Adaptive MFA goes beyond a
static list of rules and adapts to ask customers for the types of verification
that best suit a user session.
By adding​ risk-based authentication​ as a final security layer on top of your
other MFA layers, adaptive MFA avoids annoying your customers, while
keeping their data safe from attacks. By using adaptive multi-factor
authentication, you can relax with the assurance that your customers are
happy and safe when they’re using your online services and products.
The Benefits of Multi-Factor
Authentication
The benefits of multi-factor authentication form part of a customer
experience that modern customers have come to expect from any
well-managed organization in the 21st century. You can see that MFA is
rapidly becoming a standard offering from the biggest tech companies that
we deal with day to day. Failing to meet these customer expectations leaves
you at risk of losing clientele to companies that are using ​CIAM​ and MFA to
keep their data from harm.
Here’s what MFA gives you and your customers:
● Better security​ for customers and employees
● Boosted conversion​ due to smoother logins
● Improved customer trust​ due to extra security checks
● Reduced operating costs​ from data breaches to service fees
This list is, of course, not exhaustive. There are also plenty of secondary
benefits which may vary from industry to industry.
Implementing MFA with
LoginRadius
If you want to get the most out of the LoginRadius Identity platform, you
need to enable MFA. This process is relatively easy, with options for your
customers to use SMS or Google Authenticator.
First of all, decide whether SMS verification is secure enough for your
customers’ purposes. For most use cases, SMS verification is fine, but there
have been cases where a hacker has poached an email account and mobile
number. So if your customers are dealing with high-value, high-risk tasks
such as financial transactions or gambling, you may want to stick with
Google Authenticator, which allows the use of hardware keys or a software
key attached to a mobile device.
There are just a few steps in the LoginRadius Admin Console to enable SMS
verification, with options to choose your own SMS template and SMS
provider. You then have a choice of options to use as the first verification
factor: standard email and password login, username and password, access
token, or automated phone call. The second factor is, of course, a one-time
password/code sent by SMS.
To enable Google Authenticator, you’ll need to set up your ID in the Admin
Console for Google to identify your website or app on Authenticator. You can
then set up your QR code specifications and whether MFA is mandatory.
Again, you can choose from standard email and password login, username
and password, access token, or automated phone call for the first
verification factor. Google Authenticator supports FIDO 2UF hardware tokens
and app-based software tokens on smart devices, so if you want to enable
these methods you need to use Authenticator.
Whichever option you choose, LoginRadius is always on hand to help you if
you have any questions or issues.
Conclusion
Multi-factor authentication gives you a flexible way to balance customer
experience with today’s security requirements. Not only is it one of the best
ways to secure your login process, it also shows your customers that you
care about their security and take it seriously.

More Related Content

What's hot

Introduction to CSRF Attacks & Defense
Introduction to CSRF Attacks & DefenseIntroduction to CSRF Attacks & Defense
Introduction to CSRF Attacks & DefenseSurya Subhash
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access ManagementSam Bowne
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Codingbilcorry
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondJim Fenton
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol OverviewMike Schwartz
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
User authentication
User authenticationUser authentication
User authenticationCAS
 

What's hot (20)

Introduction to CSRF Attacks & Defense
Introduction to CSRF Attacks & DefenseIntroduction to CSRF Attacks & Defense
Introduction to CSRF Attacks & Defense
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Single Sign On - The Basics
Single Sign On - The BasicsSingle Sign On - The Basics
Single Sign On - The Basics
 
5. Identity and Access Management
5. Identity and Access Management5. Identity and Access Management
5. Identity and Access Management
 
Email security
Email securityEmail security
Email security
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
User Authentication: Passwords and Beyond
User Authentication: Passwords and BeyondUser Authentication: Passwords and Beyond
User Authentication: Passwords and Beyond
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
SAML Protocol Overview
SAML Protocol OverviewSAML Protocol Overview
SAML Protocol Overview
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Passwordless auth
Passwordless authPasswordless auth
Passwordless auth
 
User authentication
User authenticationUser authentication
User authentication
 

Similar to What is two factor or multi-factor authentication

What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?Caroline Johnson
 
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!Caroline Johnson
 
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...Milos Pesic
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor AuthenticationPing Identity
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsITIO Innovex
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsUbisecure
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!Caroline Johnson
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationUbisecure
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?Lucy Zeniffer
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignRajat Jain
 
Buyer’s Guide To Multi-Factor Authentication_ The Complete Guide To Protectin...
Buyer’s Guide To Multi-Factor Authentication_ The Complete Guide To Protectin...Buyer’s Guide To Multi-Factor Authentication_ The Complete Guide To Protectin...
Buyer’s Guide To Multi-Factor Authentication_ The Complete Guide To Protectin...Caroline Johnson
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfHost It Smart
 
Guide To Build vs. Buy_ An Identity Management Solution in the Media Industry...
Guide To Build vs. Buy_ An Identity Management Solution in the Media Industry...Guide To Build vs. Buy_ An Identity Management Solution in the Media Industry...
Guide To Build vs. Buy_ An Identity Management Solution in the Media Industry...Caroline Johnson
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...IJERA Editor
 
An Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationAn Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationOnsite Helper
 
An Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationAn Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationOnsite Helper
 

Similar to What is two factor or multi-factor authentication (20)

What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?What, Exactly, is Multi-Factor Authentication, and How To Use It?
What, Exactly, is Multi-Factor Authentication, and How To Use It?
 
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
What All You Need To Know About Multi-Factor Authentication & IVR in Banking!
 
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
 
Multi Factor Authentication
Multi Factor AuthenticationMulti Factor Authentication
Multi Factor Authentication
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
 
Evolution of MFA.pptx
Evolution of MFA.pptxEvolution of MFA.pptx
Evolution of MFA.pptx
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Multi-Factor Authentication & Authorisation
Multi-Factor Authentication & AuthorisationMulti-Factor Authentication & Authorisation
Multi-Factor Authentication & Authorisation
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect DesignMulti Factor Authentication Whitepaper Arx - Intellect Design
Multi Factor Authentication Whitepaper Arx - Intellect Design
 
Buyer’s Guide To Multi-Factor Authentication_ The Complete Guide To Protectin...
Buyer’s Guide To Multi-Factor Authentication_ The Complete Guide To Protectin...Buyer’s Guide To Multi-Factor Authentication_ The Complete Guide To Protectin...
Buyer’s Guide To Multi-Factor Authentication_ The Complete Guide To Protectin...
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Procert Authentication Platform by Mcarbon
Procert Authentication Platform by McarbonProcert Authentication Platform by Mcarbon
Procert Authentication Platform by Mcarbon
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
Guide To Build vs. Buy_ An Identity Management Solution in the Media Industry...
Guide To Build vs. Buy_ An Identity Management Solution in the Media Industry...Guide To Build vs. Buy_ An Identity Management Solution in the Media Industry...
Guide To Build vs. Buy_ An Identity Management Solution in the Media Industry...
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
An Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationAn Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor Authentication
 
An Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor AuthenticationAn Insight into Essential Eight’s Multi-Factor Authentication
An Insight into Essential Eight’s Multi-Factor Authentication
 

More from Jack Forbes

Authentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdfAuthentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdfJack Forbes
 
Digital identity management for the cmo, ciso, and cio
Digital identity management for the cmo, ciso, and cioDigital identity management for the cmo, ciso, and cio
Digital identity management for the cmo, ciso, and cioJack Forbes
 
Step up authentication
Step up authenticationStep up authentication
Step up authenticationJack Forbes
 
Why do consumers prefer social login
Why do consumers prefer social loginWhy do consumers prefer social login
Why do consumers prefer social loginJack Forbes
 
How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)Jack Forbes
 
Future of bring your own identity
Future of bring your own identityFuture of bring your own identity
Future of bring your own identityJack Forbes
 
Cms api integrations list-LoginRadius
Cms api integrations list-LoginRadiusCms api integrations list-LoginRadius
Cms api integrations list-LoginRadiusJack Forbes
 
Buyer’s guide to multi factor authentication
Buyer’s guide to multi factor authenticationBuyer’s guide to multi factor authentication
Buyer’s guide to multi factor authenticationJack Forbes
 
8 effective communication strategies for internal alignment and growth in 2021
8 effective communication strategies for internal alignment and growth in 20218 effective communication strategies for internal alignment and growth in 2021
8 effective communication strategies for internal alignment and growth in 2021Jack Forbes
 
Adaptive risk based authentication
Adaptive risk based authenticationAdaptive risk based authentication
Adaptive risk based authenticationJack Forbes
 
Social login-infographic
Social login-infographicSocial login-infographic
Social login-infographicJack Forbes
 
Login radius identity brokering infographic
Login radius identity brokering infographicLogin radius identity brokering infographic
Login radius identity brokering infographicJack Forbes
 
Web and Mobile SSO
Web and Mobile SSOWeb and Mobile SSO
Web and Mobile SSOJack Forbes
 
Loginradius phone authentication
Loginradius phone authenticationLoginradius phone authentication
Loginradius phone authenticationJack Forbes
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
Social Login Explained
Social Login ExplainedSocial Login Explained
Social Login ExplainedJack Forbes
 
A Guide to Multi Factor Authentication
A Guide to Multi Factor AuthenticationA Guide to Multi Factor Authentication
A Guide to Multi Factor AuthenticationJack Forbes
 
Ciam for devops
Ciam for devops Ciam for devops
Ciam for devops Jack Forbes
 
Defining the omnichannel customer experience
Defining the omnichannel customer experienceDefining the omnichannel customer experience
Defining the omnichannel customer experienceJack Forbes
 

More from Jack Forbes (20)

Authentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdfAuthentication and Authorization Defined_ What's the Difference_.pdf
Authentication and Authorization Defined_ What's the Difference_.pdf
 
Digital identity management for the cmo, ciso, and cio
Digital identity management for the cmo, ciso, and cioDigital identity management for the cmo, ciso, and cio
Digital identity management for the cmo, ciso, and cio
 
Step up authentication
Step up authenticationStep up authentication
Step up authentication
 
Why do consumers prefer social login
Why do consumers prefer social loginWhy do consumers prefer social login
Why do consumers prefer social login
 
How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)How secure is two factor authentication (2 fa)
How secure is two factor authentication (2 fa)
 
Future of bring your own identity
Future of bring your own identityFuture of bring your own identity
Future of bring your own identity
 
Cms api integrations list-LoginRadius
Cms api integrations list-LoginRadiusCms api integrations list-LoginRadius
Cms api integrations list-LoginRadius
 
Buyer’s guide to multi factor authentication
Buyer’s guide to multi factor authenticationBuyer’s guide to multi factor authentication
Buyer’s guide to multi factor authentication
 
React with Ref
React with RefReact with Ref
React with Ref
 
8 effective communication strategies for internal alignment and growth in 2021
8 effective communication strategies for internal alignment and growth in 20218 effective communication strategies for internal alignment and growth in 2021
8 effective communication strategies for internal alignment and growth in 2021
 
Adaptive risk based authentication
Adaptive risk based authenticationAdaptive risk based authentication
Adaptive risk based authentication
 
Social login-infographic
Social login-infographicSocial login-infographic
Social login-infographic
 
Login radius identity brokering infographic
Login radius identity brokering infographicLogin radius identity brokering infographic
Login radius identity brokering infographic
 
Web and Mobile SSO
Web and Mobile SSOWeb and Mobile SSO
Web and Mobile SSO
 
Loginradius phone authentication
Loginradius phone authenticationLoginradius phone authentication
Loginradius phone authentication
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Social Login Explained
Social Login ExplainedSocial Login Explained
Social Login Explained
 
A Guide to Multi Factor Authentication
A Guide to Multi Factor AuthenticationA Guide to Multi Factor Authentication
A Guide to Multi Factor Authentication
 
Ciam for devops
Ciam for devops Ciam for devops
Ciam for devops
 
Defining the omnichannel customer experience
Defining the omnichannel customer experienceDefining the omnichannel customer experience
Defining the omnichannel customer experience
 

Recently uploaded

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

What is two factor or multi-factor authentication

  • 1. What Is Two-Factor or Multi-Factor Authentication? Traditional password-and-username authentication can leave users vulnerable. In 2010 ​Christopher Chaney​, a celebrity obsessed cyber-stalker,
  • 2. got hold of a number of celebrity emails. Using data gleaned from social media and Wikipedia, he successfully guessed the passwords to over 50 personal email accounts belonging to famous women, including Scarlett Johansson, Mila Kunis, and Christina Aguilera. He had access to these accounts for almost a year, and he was responsible for posting nude photos of Scarlett Johanssen and several non-celebrity women. He has since been sentenced to 10 years in jail. Almost everyone’s email address has been exposed online somewhere (luckily there are​ ways to find out​ if this has happened). And traditional password-based authentication is inherently insecure. Given these two facts, it’s essential to offer customers additional ways to protect their accounts. Two-factor or multi-factor authentication (2FA or MFA) is an extra authentication method that’s becoming increasingly common. But just what are 2FA and MFA, and how can they help protect your customers? What Is Multi-Factor Authentication?
  • 3. The only difference between multi-factor authentication and two-factor authentication is that 2FA only uses two of the available additional checks to verify customer identity, whereas MFA may use three or more checks. More checks mean more security, but customers can find them onerous, so it’s wise to choose the number of extra checks based on both the minimum security level suitable for that service or account, and the frequency and proximity to other verification checks. If customers repeatedly have to go through multiple checks on their customer journey, they will soon become frustrated and drift away to your competitors. Of course, if you lose their data, they will also be someone else’s customer soon enough. Using multi-factor authentication as part of your customer identity and access management (CIAM) platform helps you build and maintain a solid customer opinion as the world evolves towards ​industry 4.0​.
  • 4. What Types of Multi-Factor Authentication Are There? There are a number of different checks you can use to implement MFA, and this list is always growing. When choosing which checks to use, take into account things like the level of security needed, the types of technology
  • 5. most often used by your customers to access your assets, and, to some extent, cost. SMS token A relatively straightforward measure to implement, especially for consumers and the general public, this check most often consists of a text message containing a PIN number. This PIN is then used as a one-time password (OTP), usually in addition to traditional username-and-password verification. If your customers frequently access ​your services from mobile devices​, it’s wise to offer them this or another mobile-device-based authentication method to help smooth the customer journey. Email token This method is Identical to SMS tokens, but the code is sent via email. Since not everyone has their phone with them all the time, it’s a good idea to offer this option. It can act as a backup method if your customer has had their mobile device lost or stolen. It’s also a convenient way to access an OTP from any platform that can receive email.
  • 6. Hardware token Using a separate hardware token is considered one of the most secure authentication methods available, as long as the key remains in the customer’s possession. This method is more expensive, although it can be cost-effective to provide your high-value customers with dongles for free. Business customers tend to be more willing to go the extra mile to use a hardware token, and adoption of ​hardware tokens is increasing​. But it’s still not a good idea to make them compulsory for anyone but the most high-value, at-risk customers such as banking, insurance, and investment clients. Users just need to insert the hardware token into their device to use it. If they use a mobile device for access, they may need another dongle to add a USB or USB-C port to their smart device. Software token By using an authentication application on a mobile device, you can get almost the same level of security as with a hardware token. Essentially, the smart device becomes the token. This can be tied in with services like Google Authenticator.
  • 7. Getting customers to use a third-party solution can help encourage them to use MFA for more of their services outside of your business, thus increasing their overall security. It also makes a great alternative to carrying an additional dongle to attach a hardware token to a smart device. Phone call Another way to get a one-time password is via automated phone call. Biometric verification People with a smart device or computer with biometric authentication (such as fingerprint ID or facial recognition) can use this check to confirm their identity as part of MFA. ​Biometric ID verification ​tends to be less hassle than typing in an OTP, so customers find it less aggravating to use it frequently. The lower friction makes it an ideal option when extra checks are unavoidable. Other forms of multi-factor authentication
  • 8. There are a few other digital verification methods available to your customers. Social login​, also called social identity verification, is something many users find convenient, since they’re usually already logged in to the relevant accounts. Bear in mind though that social media platforms are high-value targets for hackers, so social ID verification shouldn’t be the only method used on top of username/password in most cases. Security questions​ are a type of knowledge-based authentication (KBA) where the questions and answers are static. The questions could be defined by the business or the customer, and the customer provides the answers that are later verified. Dynamic KBA, which is more secure than static KBA, uses questions that are generated in real-time based on data records such as credit history or transactions. Risk-based authentication (RBA) can also be used in conjunction with MFA. By monitoring things like location, device, and even user keystrokes, you can tailor the frequency of MFA checks to the security situation. RBA helps avoid asking customers for extra verification repeatedly when they’re signing in from their “home” machine and location.
  • 9. How Secure Is MFA? The security of your ​MFA solution​ depends on a few different things. First of all, you need engaged, willing customers to apply the above solutions. As mentioned earlier, hardware keys offer greater security than social verification, but they cost money and effort to use.
  • 10. It’s also important to make sure your MFA set up follows a few basic security steps: ● Make sure that new users can’t set up MFA the first time they log in. An attacker with a valid password could steal the account and set up MFA with their choice of phone number. ● Make sure automated phone calls use clear messages that let the user know someone is trying to log in. ● Educate customers about their chosen MFA methods; make sure they know what to do and who to contact if there is an issue. ● Don’t allow high-value, high-risk clients to authenticate with less secure MFA methods like social verification. ● Make sure you use multi-factor authentication rather than two-factor authentication. 2FA with SMS and username/password for the two factors is increasingly vulnerable to ​SIM swapping​. At the end of the day, no system is ever 100% secure. What MFA does is protect your customers from all but the most determined hackers, and it protects them many thousands of times better than username/password alone. What Is ​Adaptive​ Multi-Factor Authentication? Adaptive MFA is a method that your CIAM provider uses to apply the right level of authentication security depending on the risk profile of the actions
  • 11. currently being attempted by the customer. Adaptive MFA goes beyond a static list of rules and adapts to ask customers for the types of verification that best suit a user session. By adding​ risk-based authentication​ as a final security layer on top of your other MFA layers, adaptive MFA avoids annoying your customers, while keeping their data safe from attacks. By using adaptive multi-factor authentication, you can relax with the assurance that your customers are happy and safe when they’re using your online services and products.
  • 12. The Benefits of Multi-Factor Authentication The benefits of multi-factor authentication form part of a customer experience that modern customers have come to expect from any well-managed organization in the 21st century. You can see that MFA is rapidly becoming a standard offering from the biggest tech companies that we deal with day to day. Failing to meet these customer expectations leaves you at risk of losing clientele to companies that are using ​CIAM​ and MFA to keep their data from harm. Here’s what MFA gives you and your customers: ● Better security​ for customers and employees ● Boosted conversion​ due to smoother logins ● Improved customer trust​ due to extra security checks ● Reduced operating costs​ from data breaches to service fees This list is, of course, not exhaustive. There are also plenty of secondary benefits which may vary from industry to industry.
  • 13. Implementing MFA with LoginRadius If you want to get the most out of the LoginRadius Identity platform, you need to enable MFA. This process is relatively easy, with options for your customers to use SMS or Google Authenticator. First of all, decide whether SMS verification is secure enough for your customers’ purposes. For most use cases, SMS verification is fine, but there have been cases where a hacker has poached an email account and mobile number. So if your customers are dealing with high-value, high-risk tasks such as financial transactions or gambling, you may want to stick with Google Authenticator, which allows the use of hardware keys or a software key attached to a mobile device. There are just a few steps in the LoginRadius Admin Console to enable SMS verification, with options to choose your own SMS template and SMS provider. You then have a choice of options to use as the first verification factor: standard email and password login, username and password, access token, or automated phone call. The second factor is, of course, a one-time password/code sent by SMS.
  • 14. To enable Google Authenticator, you’ll need to set up your ID in the Admin Console for Google to identify your website or app on Authenticator. You can then set up your QR code specifications and whether MFA is mandatory. Again, you can choose from standard email and password login, username and password, access token, or automated phone call for the first verification factor. Google Authenticator supports FIDO 2UF hardware tokens and app-based software tokens on smart devices, so if you want to enable these methods you need to use Authenticator. Whichever option you choose, LoginRadius is always on hand to help you if you have any questions or issues. Conclusion Multi-factor authentication gives you a flexible way to balance customer experience with today’s security requirements. Not only is it one of the best ways to secure your login process, it also shows your customers that you care about their security and take it seriously.