Two-Factor Authentication (2FA)
Authentication is a critical component of verifying a digital identity and therefore a key pillar of any IAM process. Authentication is the process of checking whether a user, application, or device truly is who or what it is attempting to be. In other words, you verify whether the provided digital identity matches the authenticity characteristics and data known to you. Where single-factor authentication, authenticating with only a username and password, used to be the norm, more organizations now choose strong authentication. Two-factor authentication is one of those forms of strong authentication. But what exactly does two-factor authentication involve? And why is it a step forward compared with single-factor authentication?
What is Two-Factor Authentication?
Two-factor authentication also uses the username and password combination, but adds an extra step. After supplying those two credentials, a system or admin asks you for an additional verification key. Terms like two-step verification and two-factor authentication are often used as synonyms. With two-factor authentication you need two of the three items below, usually a combination of the first two:
Something a person knows (password, answer to a security question)
Something a person has (phone)
Something a person is (fingerprint, iris scan, facial recognition)
The extra credential is personal and only in your possession. A common method is to send a code or SMS to your phone or to an email address you own. A stolen or guessed password is therefore no longer sufficient for a hacker or cybercriminal to gain unauthorized access to your data or digital environments. With two-factor authentication you add an extra security layer through the combination of what you know and what you have.
Examples of Two-Factor Authentication
There are several well-known examples of companies or platforms that use two-factor authentication. At Microsoft, for example, you can enable it under the heading 'Additional security options'. You can then choose various sign-in methods, such as receiving an SMS with a verification code or using the Microsoft Authenticator app. After configuring the app, it will display a prompt during sign-in with your Microsoft account. You only need to approve it to gain access.
You can also enable two-factor authentication with Google, Apple ID, and more recently Facebook (code to your mobile phone). A government portal such as DigiD also uses two-step verification by sending an access code to one of your own trusted devices after entering your username and password.
Multiple Sign-Ins
There is also a way to make two-step verification even faster and easier. With apps such as Microsoft Authenticator and Google Authenticator you can manage multiple services that use two-step verification, for example Outlook, SharePoint, OneDrive, Gmail, and Google Drive, without using a separate authentication app each time. You can add a service with the plus sign or scan a QR code that links a service to the app.
Why Are Two-Step Verification and 2FA Important?
Hackers and malware increasingly and automatically search for login credentials. An extra security key therefore helps. With two-step verification and two-factor authentication you better protect your email accounts, business environments, and social media against cybercrime.
The extent to which two-factor authentication increases your security depends strongly on the protection of the second component. If this is, for example, a code sent by email, a hacker who has already compromised your computer may have little difficulty compromising the second factor. An SMS code to your mobile phone is much more reliable. A hacker who wants to sign in to your account then needs access to both your computer and your mobile phone.
Related Articles
- Not Complex, But Long Passwords
- Why Is Identity and Access Management More Important Now Than Ever?
- Four Benefits of an Identity & Access Management Solution in Financial Services
- 5 Reasons Healthcare Organizations Should Consider an Identity & Access Management Solution
- Part 2: Mitigating the risk of internal breach
- To hack or not to hack?
- How does MFA benefit my organization
- Password Issues, Human Capital, & Productivity
- IAM for Small Businesses: Is it Necessary?