two-factor authentication


Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Wikipedia.

two-factor authentication

The use of two independent mechanisms to verify the identity of a user. Authentication factors are categorized as follows:

1. What you know (password, PIN, personal data).

2. What you have (private cryptographic key, authentication token).

3. What you are (biometric scan).

4. What you do (speak a phrase, hand write a signature).

Any two of these four factors are used in two-factor authentication; for example, using a password with an authentication token (1 and 2) or using a password with a fingerprint scan (1 and 3). A password and security question such as "what is your grandmother's name" may be two factors, but they both fall into the "what you know" category, and both items could be acquired illegally from the same website. One factor from two of the four categories is more secure.

Cellphone Second-Factor Codes
Another common two-factor method is that after users log in with a password, a code is texted to their cellphone ("what you have"). Copying that security code from the phone into the login process provides the second factor. See FIDO, authentication, smart card, password and one-time password.
References in periodicals archive ?
According to Google software engineer Grzegorz Milka, the low adoption rate is a result of users finding two-factor authentication too burdensome to adapt.
As IT continues to look to two-factor authentication to deal with the credentials crunch, the vast majority (91%) of respondents are seeking to do this by using cloud-based authentication-as-a-service and managing their organization's two-factor authentication centrally.
It features the ultimate guide to turning on two-factor authentication (2FA), an additional layer of security that prevents hackers from accessing accounts even if they know your password, for more than 100 websites including popular online banking, social networking and shopping sites.
The benefit of a two-factor authentication is that even if someone has your login information, they still need that second piece of the puzzle.
Two-factor authentication -- sometimes called two-step verification -- is a more demanding method of locking an account than a password-only process.
Two-factor authentication works by requiring each user to provide not just a username and password but also a unique one-time six-digit security code generated by a user's VIP authentication credential.
Available through its network of channel partners, Signify provides a 24/7 two-factor authentication service to clients who need secure remote access.
The FFIEC determined that in order to curb the rash of phishing schemes and other attacks, providers of online financial services, after an internal risk assessment to determine their level of exposure, should at the very least employ some degree of two-factor authentication.
ASAS delivers value-added functionality to ISA Server by seamlessly integrating Authenex's highly-secure two-factor authentication technology with Microsoft's remote dial-in access (RAS) and virtual private networks (VPN) solutions.
A major provider of security solutions and services for CA Single Sign-On (officially called CA SiteMinderA), IDF Connect, has announced the launch of its turnkey Two-Factor Authentication solution, SSO/MobileKey.
LogicaCMG has announced it is joining forces with Arcot to bring a software-based two-factor authentication system to market.