Skip to content
geeksforgeeks
  • Tutorials
    • Python
    • Java
    • Data Structures & Algorithms
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps And Linux
    • School Learning
    • Practice Coding Problems
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • Data Science Training Program
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • Aptitude
  • Engineering Mathematics
  • Discrete Mathematics
  • Operating System
  • DBMS
  • Computer Networks
  • Digital Logic and Design
  • C Programming
  • Data Structures
  • Algorithms
  • Theory of Computation
  • Compiler Design
  • Computer Org and Architecture
Open In App
Next Article:
Multifactor Authentication
Next article icon

Multifactor Authentication

Last Updated : 19 Jan, 2023
Comments
Improve
Suggest changes
Like Article
Like
Report

Multi-factor authentication (MFA) takes two or more authentication methods from different categories to confirm a user's identity, MFA is increasingly important for secure networks. It is a two-step verification mechanism that satisfies user demand for an easy sign-in process while protecting data and apps. Through several verification methods, such as phone, SMS, and mobile app verification, it offers robust authentication. MFA's security comes from its layered approach.

Multifactor Authentication

As depicted in the diagram, for authentication, the user needs a password and an additional phone or fingerprint to completely authenticate. So, we can imagine it’s like an ATM, where the way to gather information about any bank account requires both a physical card and a personal PIN. By requiring two or more pieces 
for full authentication, multi-factor authentication (MFA) adds protection to the user’s identity.

Multifactor Authentication
 

Component of MFA:

These are divided into three groups, they are as follows: 

  1. Something you are familiar with, such as a password or a response to a security question.
  2. Something that you own, such as a smartphone app that receives notifications or a token-generating device.
  3. Something you are—usually a biometric trait like a fingerprint or face scan, which is employed on many mobile devices.
     

Why do we use it?

Well, it reduces the impact of credential exposure and improves identity security. If we use MFA, a malicious hacker will need a user's password as well as their phone or fingerprint to fully authenticate. So, a hostile hacker will be unable to exploit those credentials to authenticate.
Malicious hackers face a considerable hurdle when it comes to compromising numerous authentication factors. Even if a malevolent hacker learns the user's password, it's meaningless unless they also have control of the trusted device. If the user misplaces the gadget, anyone who discovers it will be unable to use it unless they have the user's password.

Choosing Supported Authentication Methods

When we enable MFA, we have the option of selecting which authentication methods will be available. We should always support multiple methods so that we have an alternative if their preferred method fails. We have the option of using one of the following methods:

Choosing supported authentication methods
 
  1. Mobile App Verification Code: In this case, an OATH verification code can be retrieved via a mobile authentication app such as the Microsoft Authenticator app, which is then typed into the sign-in screen. This code is changed every 30 seconds, and the software functions even when there is no internet connection.
  2. Call to a phone: For example, Azure can dial a phone number provided by the user. The user then uses the keypad to confirm the authentication. This is the preferred technique for backup.
  3. Sending a text message to a phone: We can send a text message to a phone with a verification code. The user then completes the authentication by entering the verification code into the sign-in window.


Let's take a closer look at each of these:

  1. Password: We can't make this method inactive; this is the default method.
  2. Security Questions Users are asked questions in these security questions that they can only answer during registration. A user's questions and answers cannot be read or changed by an administrator.
  3. Windows Hello for Business: Windows Hello for Business is a biometric authentication system that uses facial recognition or fingerprint matching to deliver secure, fully integrated biometric authentication.
  4. Security keys from Fast Identity Online (FIDO)2 are a password-less authentication solution based on industry standards that can be used in any form factor. At the sign-in screen, users can register and then choose a FIDO2 security key as their primary method of authentication. These USB-based FIDO2 security keys can also, be Bluetooth or NFC-enabled.
  5. Microsoft Authenticator app: By sending a notification to the user’s smartphone or tablet, the Microsoft Authenticator app helps block fraudulent transactions and prevents unauthorized access to accounts. By viewing the notification, users can accept or reject the request.
  6. Hardware OATH tokens: It is an open standard that outlines the creation of one-time passwords. These tokens are available for purchase by customers from any seller of one-time passwords. These tokens are available for purchase by customers from any seller. But keep in mind that secret keys are only allowed to include 128 characters, so not all tokens may be compatible with them.
  7. OATH software tokens: computer programs Applications like the Microsoft Authenticator app and other authenticator apps are frequently used to generate OATH tokens, and the secret key, or seed, that is entered into the app and utilized to generate each OTP is produced by Azure AD (Active Directory).
  8. Text message: To proceed, the user must type the code into the browser within a predetermined time frame. When a user logs in, Multi-Factor Authentication (MFA) adds more protection than simply using a password.


Authentication Method Strength and Security


Review the available authentication methods when we deploy features like multi-factor authentication in your organization. Choose the ways that meet or exceed your requirements in terms of security, usability, and availability. Where possible, use authentication methods with the highest level of security.

Authentication Method Strength and Security
 

 

Disadvantage: 


The disadvantage is that multi-factor authentication takes longer. Not only can require two or more types of verification to lengthen a procedure, but the setup itself can be time-consuming. Multi-factor authentication cannot be set up by a company on its own. It has to be done by a third party. Despite its drawbacks, MFA is still considered one of the greatest levels of security that all firms should strive to deploy to protect their employees, networks, and consumers.
Last but not least, here's how some of the drawbacks of multi-factor authentication can be turned into benefits:

  1. Consider a dedicated vendor management system.
  2. Consider a specialized vendor management system.
  3. Replace your VPN with a better, more complete solution instead of spending money on an expensive one.

Next Article
Multifactor Authentication

S

shraddhapand29
Improve
Article Tags :
  • Computer Networks

Similar Reads

    SAML Authentication
    SAML is an XML based framework that stands for Security Assertion Markup Language. SAML is used to enable SSO (Single-Sign-On). SSO allows users to log in once and gain access to multiple applications without having to sign in separately to each one. Example - When you log in to your Google Account,
    4 min read
    Authentication in Computer Network
    Prerequisite - Authentication and Authorization Authentication is the process of verifying the identity of a user or information. User authentication is the process of verifying the identity of a user when that user logs in to a computer system. There are different types of authentication systems wh
    4 min read
    Types of Two-factor Authentication
    Two-factor Authentication refers to the use of any two self-reliant methods from the various authentication methods. Two-factor authentication is used to ensure that the user has been recognized to access secure systems and to increase the security. Two-factor authentication is first implemented for
    4 min read
    What is Biometric Authentication?
    Biometric authentication is a way to safeguard your personal and sensitive information with fingerprints, Iris patterns, and facial or voice recognition to confirm identity. It offers a significant advantage over easily compromised passwords. With the rise of cyber threats, traditional methods like
    10 min read
    Importance of Two Factor Authentication
    Two-factor authentication referred to us a two-step of verification, Most of the user use one-factor authentication to log in to their social media or to any platform on the internet which has an authentication. So using two-factor authentication is where after giving the username and password we al
    3 min read
geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • In Media
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Placement Training Program
  • Languages
  • Python
  • Java
  • C++
  • PHP
  • GoLang
  • SQL
  • R Language
  • Android Tutorial
  • Tutorials Archive
  • DSA
  • Data Structures
  • Algorithms
  • DSA for Beginners
  • Basic DSA Problems
  • DSA Roadmap
  • Top 100 DSA Interview Problems
  • DSA Roadmap by Sandeep Jain
  • All Cheat Sheets
  • Data Science & ML
  • Data Science With Python
  • Data Science For Beginner
  • Machine Learning
  • ML Maths
  • Data Visualisation
  • Pandas
  • NumPy
  • NLP
  • Deep Learning
  • Web Technologies
  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • ReactJS
  • NextJS
  • Bootstrap
  • Web Design
  • Python Tutorial
  • Python Programming Examples
  • Python Projects
  • Python Tkinter
  • Python Web Scraping
  • OpenCV Tutorial
  • Python Interview Question
  • Django
  • Computer Science
  • Operating Systems
  • Computer Network
  • Database Management System
  • Software Engineering
  • Digital Logic Design
  • Engineering Maths
  • Software Development
  • Software Testing
  • DevOps
  • Git
  • Linux
  • AWS
  • Docker
  • Kubernetes
  • Azure
  • GCP
  • DevOps Roadmap
  • System Design
  • High Level Design
  • Low Level Design
  • UML Diagrams
  • Interview Guide
  • Design Patterns
  • OOAD
  • System Design Bootcamp
  • Interview Questions
  • Inteview Preparation
  • Competitive Programming
  • Top DS or Algo for CP
  • Company-Wise Recruitment Process
  • Company-Wise Preparation
  • Aptitude Preparation
  • Puzzles
  • School Subjects
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Social Science
  • English Grammar
  • Commerce
  • World GK
  • GeeksforGeeks Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
geeksforgeeks-suggest-icon
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
geeksforgeeks-improvement-icon
Suggest Changes
min 4 words, max Words Limit:1000

Thank You!

Your suggestions are valuable to us.

What kind of Experience do you want to share?

Interview Experiences
Admission Experiences
Career Journeys
Work Experiences
Campus Experiences
Competitive Exam Experiences