multi-factor-authentication-(mfa)
A security system that requires more than one method of authentication from independent categories to verify a user's identity.
MFA adds an extra layer of security beyond just a password. It requires users to provide two or more verification factors to gain access to a resource such as an account, application, or system. These factors typically fall into categories like something you know (password, PIN), something you have (security token, smartphone), and something you are (biometrics). By requiring multiple factors, MFA significantly reduces the risk of unauthorized access, even if one factor is compromised.
In the context of blockchain and crypto, MFA is crucial for securing digital assets and accounts. It protects against various threats, including phishing attacks, password breaches, and malware. Implementing MFA on exchanges, wallets, and other crypto-related platforms is a standard security practice to safeguard user funds and sensitive information.
graph LR
Center["multi-factor-authentication-(mfa)"]:::main
Rel_2fa_two_factor_authentication["2fa-two-factor-authentication"]:::related -.-> Center
click Rel_2fa_two_factor_authentication "/terms/2fa-two-factor-authentication"
Rel_identity_and_access_management_iam["identity-and-access-management-iam"]:::related -.-> Center
click Rel_identity_and_access_management_iam "/terms/identity-and-access-management-iam"
Rel_mfa_multi_factor_authentication["mfa-multi-factor-authentication"]:::related -.-> Center
click Rel_mfa_multi_factor_authentication "/terms/mfa-multi-factor-authentication"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧠 Knowledge Check
🧒 Explain Like I'm 5
MFA is like having a door that needs both a physical key AND a secret password to open. A thief might find your key on the ground, but without the password, they still can't get inside. It makes your account much harder to hack!
🤓 Expert Deep Dive
MFA protocols often rely on standards like OAuth 2.0, OpenID Connect, or SAML for federated identity management, integrating with identity providers (IdPs). The security strength depends heavily on the diversity and independence of the factors used; relying solely on two 'knowledge' factors (e.g., password + security question) is not true MFA. Advanced implementations might incorporate adaptive authentication, where the required factors dynamically adjust based on risk signals like location, device reputation, or user behavior patterns. Vulnerabilities can arise from phishing attacks targeting specific factors (e.g., SIM swapping for SMS-based MFA), insecure storage of secrets, or flaws in the authentication protocol itself. The trade-off between security and usability is a constant consideration, driving the adoption of more seamless factors like FIDO2/WebAuthn.