Multi-Factor Authentication (MFA)
Multi-Factor Authentication, or MFA, is a form of authenticating users that utilizes more than one method of identification when connecting to a secure site or service. This provides an additional layer of security over traditional forms of single sign-on authentication, which require only one type of identification such as a password.
Also known as two-factor authentication, or 2FA, multi-factor authentication can take several forms, but most typically utilizes either a smartphone or a smart card in conjunction with a password or PIN. More advanced forms of MFA will sometimes rely on biometrics such as fingerprint recognition or retina scanning for the second form of authentication.
How Multi-Factor Authentication Normally Works
A user logging into a site secured with MFA will typically enter a password and then will have a code sent to the smartphone number (or email address) associated with the account. Only after the correct password and the authentication code have been successfully entered will the user be able to access the site or service.
While not completely foolproof, MFA does make it harder for hackers to log in to a user’s account, as they would need to have both the user’s password and access to their smartphone or similar device in order to correctly provide both forms of authentication.
As a result, MFA is typically deployed for protecting access to more sensitive or mission-critical information within an enterprise. MFA is also increasingly becoming a requirement in government mandates for regulation and compliance.
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...
Stay up to date on the latest developments in Internet terminology with a free newsletter from Webopedia. Join to subscribe now.
From A3 to ZZZ this guide lists 1,500 text message and online chat abbreviations to help you translate and understand today's texting lingo. Read More »List of Well-Known TCP Port Numbers
Port numbers 0 to 1024 are reserved for privileged services and designated as well-known ports. This list of port numbers are specified in... Read More »
Computer architecture provides an introduction to system design basics for most computer science students. Read More »Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »