Two-factor authentication (2FA) explained: How it works and how to enable it

  • Enhanced security: 2FA greatly reduces the risk of unauthorized access by providing a second factor of identification beyond just a password. This additional layer provides additional security in case the password falls into the wrong hands.
  • Compliance: Due to widespread breaches, some industries, such as defense, law enforcement, and government, have introduced regulations that require access controls beyond passwords, including 2FA, to access certain programs or organizations. Some industries, such as finance and healthcare, have regulations regarding data security and privacy that require addressing password security procedures.
  • Additional protection against phishing: According to CISA, more than 90% of cyber attacks start with phishing. Two-factor authentication provides another layer of protection, should an employee become the victim of a phishing attempt, compromising password information.
  • The customer’s peace of mind: Although 2FA requires an extra hoop for customers to jump through to access their accounts, having 2FA in place for your organization’s services can help ease customer concerns about the security of their data or operations.

How does two-factor authentication work?

To understand what 2FA entails, you first need to know what a “factor” is in security access terms. An attribute is a piece of information needed to verify your identity. Broadly, the features can be divided into six categories:

  • Information: This type of feature involves something the user knows, such as a password or the answer to a security question.
  • Presence: To verify a user’s identity, the security system may use something the user is expected to have, such as a specific phone number or security token.
  • Origin: Biometrics, such as fingerprints or facial recognition, can be used to authenticate a user based on something inherent to their identity.
  • Conduct: This type of feature uses features to identify user-specific behaviors, such as voice recognition.
  • Location: Geolocations can also be used to authenticate the user, for example, via GPS or IP geolocation.
  • Time: Time may also be involved as a factor, often associated with one of the above. For example, a one-time pass (OTP) code sent via text message to a device (asset) with a 5-minute confirmation window.

True 2FA pairs your first authentication factor — usually a password (ie, information) — with a second factor of a completely different type, such as:

  • What you have (possession)
  • What you are (nature)
  • What you do (behaviour)
  • Wherever you are (location)

Users will need to provide both features to gain access to their accounts.

In the background, organizations using 2FA need to provide users with the necessary interfaces to provide both authentication features, which may include integration with SMS systems to send OTPs to smartphones, use hardware biometric APIs on a laptop or mobile device, or develop a hardware application of smartphones for second-factor authentication, for example.

Organizations will also need an authentication server that can authenticate both elements used. This server will also need to be integrated with the application or service that 2FA is intended to protect in order to allow access.

Examples of 2FA authentication methods

Given the many things that can be used for 2FA, the range of possibilities for two-factor authentication is wide. Common methods include entering the password with one of the following:


Source link