What Is Two-Factor Authentication (2FA)?Â
Two-factor authentication (2FA) is a form of multi-factor authentication (MFA), and is also known as two-step authentication or two-step verification. 2FA is a security measure that requires end-users to verify their identities through two types of identifiers to gain access to an application, system, or network.
Think of your most recent login experiences. When you sign in to Netflix, for example, youâre probably asked to simply provide a username and passwordâa single factor. When you log in to your online banking account, however, you often need to provide a username and password as well as the answer to a security question or an SMS one-time password (OTP). The website asks for two factors in order to verify your identity.
2FA provides an additional layer of protection, securing user identities and preventing organisationsâ online resources from being accessed by bad actors. With two-factor authentication, attackers face an additional barrier to access. Even if they know a userâs password, bad actors would still need to spoof a second factor, which can be difficult depending on the type of factor thatâs enabled.
In this post, weâll dive into the details of how 2FA works, how this method of authentication protects users and organisations, and the different types of 2FA available.
How does 2FA work?
Put simply, 2FA confirms a userâs identity by verifying one authentication factor against a second authentication factor.Â
The more distinct these factors are from each other, the more secure the login process will be. There are three main categories of factors to choose from:
- Knowledge factors: Something the user knows. This can be a password, a PIN, or an answer to a security question.
- Possession factors: Something the user owns, such as a mobile phone, credit card, or USB token.
- Inherence factors: Something that uniquely identifies the user. This includes biometrics (for example, a fingerprint or voice) and behavioural identifiers (typing dynamics, etc.).Â
Why is 2FA important?
A recent report from IBM estimated that a data breach can cost organisations upwards of $3 million, and according to recent research from Symantec, 80% of data breaches can be prevented by 2FA. There are a few reasons why even the most basic 2FA implementation can make a huge impact:
Passwords arenât perfect, and poor practices are common
Traditionally, organisations have relied on usernames and passwords to authenticate users and provide access to their apps, directories, and resources. But these precautions are not enough to secure the modern workforce.
This is, in part, because users often do not follow password best practices. In 2020, for example, the most commonly exposed passwords were â123456â (used by 2.5 million people worldwide), â123456789,â âpicture1,â and âpassword.â While organisations can minimise these poor behaviours with strong password policies, other offences arenât as easy to prevent, like writing down credentials, recycling passwords across accounts, or sharing passwords with others.
Phishing attacks are a prevalent threat
Auth-based cyber attacks have become increasingly common over the past few years, especially as bad actors have embraced targeting users. For example, phishing, a common cyber attack wherein malicious actors send an email that âfishesâ for personal information, is one of the top threats facing organisations today; in fact 36% of all data breaches within the last year involved phishing.
Phishing emails look as if they were sent by legitimate organisations and often encourage users to log in to their bank, social media, or corporate accounts. The email may claim that the userâs account will be deactivated if no action is taken or that their credentials have already been compromised and that a password reset is necessary. Many people fall for the content in these messages and enter their credentials into a malicious form or spoofed website, thereby revealing their password to hackers.
A single hacked account may be just the beginning
Worse still, if the same password or variations of the same password are used for several accounts and apps, the hacker can potentially gain access to them all. Through a technique called credential stuffing, bad actors who acquire one set of credentials will use automated tools to try to hack other accounts using the same password.
And since the average person manages 130 accounts, and password reuse is common, thereâs a high chance that the bad actor succeeds in compromising additional profiles. From here, they can harvest sensitive information from within and even sell the compromised credentials on the dark web.
How 2FA helps
2FA addresses all of these problems by making it more difficult for malicious actors to gain unauthorised access, while still delivering the seamless digital experiences that users have come to expect. Even if a bad actor gains access to a userâs password via careless password practices or a phishing attack, the hacker cannot log in to the victimâs accounts due to the second factor.
Common 2FA methods
Now that weâve discussed how two-factor authentication can boost security and protect against common threats, letâs look at the types of 2FA available for use:
Hardware tokens
Hardware tokens are small devices (like a key fob or USB stick) that produce a new numerical code every 30 seconds. When a user attempts to access their account, they can verify their identity by simply entering the code shown on the device. While this form of two-step verificationâone of the oldest methodsâseems great in theory, tokens are expensive to distribute, are often lost by users, and can be easy to hack.Â
SMS OTPs
This form of SMS-based authentication sends a one-time password (OTP) to the userâs mobile device via text message after the user submits their username and password. Once users receive the code, they submit it to the service theyâre attempting to access for verification. Various organisations have utilised this factor to verify purchases and other user actions, but many are moving away from it given the security vulnerabilities inherent to SMS.
Voice OTPs
Voice OTPs work similarly to SMS OTPs. Upon entering their username and password, the user will receive a phone call that delivers the 2FA code verbally. This authentication factor is less common but is often used in countries that have low smartphone usage.
Software tokens
Software tokens require users to download an authenticator app on their smartphone or desktop. When a user logs in to the authenticator application, a temporary software-generated OTP is issued. They then need to share that code with the service theyâre attempting to access. Software tokens typically generate and display on the same device, limiting the chances of a hacker intercepting the code.
Push notifications
Instead of sending an OTP, this method sends a push notification to users after they have entered their username and password. The user can then review the details of the login attempt and approve or deny access. This two-step verification process directly connects the app or website, the 2FA service, the user, and their device. Itâs a user-friendly option that removes the chance of phishing, unauthorised access attempts, and other threats like man-in-the-middle attacks.
Biometrics
Biometric factors enable users to verify their identity by using something that could only belong to them. Examples include fingerprints, retina scans, facial and voice recognition, or even behavioural identifiers like typing patterns.
Which factors should I use?
When deciding which factors to deploy, there are a few things to consider. First, think about the application or service that needs to be protected. It is especially important that apps containing sensitive personal information be protected by the strongest factors possible. Organisations may even want to consider deploying more than two factors to verify a userâs identity with even more certainty.
Organisations should also think about their users. For instance, senior executives typically have access to more confidential corporate data, and therefore should need to verify their identity with more secure factors more often. On the other hand, contractors and interns are unlikely to have access to critical data and can therefore be verified less frequently.
Solutions like Okta Verify are a good choice because the authentication process takes place on the same device the access is requested from. This significantly reduces the chance of hackers intercepting credentials between the time a user provides a password and enters a 2FA code. Biometric-based authentication is another strong factor that should be considered as an additional security layer for any business-critical app or service.
2FA is good, but adaptive MFA is better
While using two-factor authentication is more secure than passwords, thereâs more that organisations can do to secure their applications and networks and verify user identities.Â
Adaptive Multi-Factor Authentication, for example, gives system admins full control over when, where, and by who 2FA or MFA needs to be used. IT teams can choose which factors are the best fit for certain users within their organisation, from contextual behaviour and login patterns to geolocation and proxy detection. Organisations can also create nuanced policies, such as only authenticating logins from managed or known devices. Adaptive MFA provides organisations with secure, seamless access that will delight users.
For more information about how to verify users, check out our Ultimate Authentication Playbookâor get started with a free trial today.