mfa-(multi-factor-authentication)
Multi-Factor Authentication (MFA) is a security system requiring multiple verification methods to access a resource, enhancing security beyond passwords.
Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide two or more distinct verification factors to gain access to a resource, such as an application, online account, or VPN. This layered approach significantly enhances security compared to single-factor authentication (like just a password) by making it much harder for unauthorized individuals to gain access, even if one factor is compromised. The verification factors are typically categorized into three types: something the user knows (e.g., password, PIN), something the user has (e.g., smartphone with an authenticator app, hardware token, smart card), and something the user is (e.g., fingerprint, facial recognition, iris scan). MFA systems require a combination of at least two of these categories. Common MFA implementations include using a password (know) combined with a one-time passcode (OTP) sent via SMS or generated by an authenticator app (have), or a password combined with a biometric scan (is). The process involves the user submitting the first factor (usually a password), followed by a prompt for the second or subsequent factors. The system verifies all provided factors before granting access. MFA is crucial for protecting sensitive data and systems against common threats like phishing, credential stuffing, and brute-force attacks. Trade-offs include potential usability friction for end-users and the cost and complexity of implementing and managing MFA solutions.
graph LR
Center["mfa-(multi-factor-authentication)"]:::main
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Rel_multi_factor_authentication_mfa["multi-factor-authentication-mfa"]:::related -.-> Center
click Rel_multi_factor_authentication_mfa "/terms/multi-factor-authentication-mfa"
Rel_2fa_two_factor_authentication["2fa-two-factor-authentication"]:::related -.-> Center
click Rel_2fa_two_factor_authentication "/terms/2fa-two-factor-authentication"
Rel_authentication["authentication"]:::related -.-> Center
click Rel_authentication "/terms/authentication"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Explain Like I'm 5
It's like needing your house key (something you have) AND a secret code you know to open your front door, making it much harder for burglars.
🤓 Expert Deep Dive
Multi-Factor Authentication (MFA) strengthens authentication by enforcing the principle of independent verification factors. The security gain stems from the difficulty of compromising multiple, distinct factor types simultaneously. The three primary factor categories (knowledge, possession, inherence) are designed to be orthogonal, meaning the compromise of one type does not inherently compromise another. For instance, a stolen password (knowledge) does not automatically yield access to a physical security token (possession). Protocols like TOTP (Time-based One-Time Password) and HOTP (HMAC-based One-Time Password) are common for the 'possession' factor, often implemented via authenticator apps or hardware tokens. FIDO Alliance standards (e.g., U2F, WebAuthn) are increasingly adopted for possession-based authentication using hardware security keys, offering enhanced resistance to phishing. Biometric factors (inherence) rely on unique physiological or behavioral characteristics, but their reliability can be affected by environmental conditions or spoofing attempts. Architectural considerations involve the choice of authentication protocols, the secure storage and transmission of authentication data, and the user experience design to minimize friction. Vulnerabilities can include phishing attacks targeting the initial credential, SIM-swapping attacks to intercept SMS-based OTPs, or weaknesses in biometric template security. The trade-off between security robustness and user convenience remains a central challenge.