Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!

Multi-factor authentication

Index Multi-factor authentication

Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are). [1]

59 relations: Authentication, Automated teller machine, Bank card, Biometrics, Client (computing), Comparison of authentication solutions, Computer network, Credential, Credit unions in the United States, Desktop computer, Facial recognition system, Federal Financial Institutions Examination Council, Fingerprint, Fraud, Identity management, Identity theft, Iris recognition, Keystroke dynamics, Knowledge-based authentication, Laptop, Machine, Man-in-the-browser, Man-in-the-middle attack, Memory, Mobile app, Mobile phone, Mobile phone spam, Multi-factor authentication, Mutual authentication, National Institute of Standards and Technology, Online banking, Out-of-band, Passphrase, Password, Payment card industry, Personal digital assistant, Personal identification number, Phishing, Phone cloning, Radio-frequency identification, Reliance authentication, Security token, Signalling System No. 7, Smart card, SMS, Social engineering (security), Software, Software token, Speaker recognition, Strong authentication, ..., The Verge, Time-based One-time Password algorithm, Transaction authentication number, Trojan horse (computing), United States, User (computing), Virtual private network, Web page, World Wide Web. Expand index (9 more) »


Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Multi-factor authentication and Authentication · See more »

Automated teller machine

An automated teller machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, transfer funds, or obtaining account information, at any time and without the need for direct interaction with bank staff.

New!!: Multi-factor authentication and Automated teller machine · See more »

Bank card

A bank card is typically a plastic card issued by a bank to its clients that performs one or more of a number of services that relate to giving the client access to funds, either from the client's own bank account, or through a credit account.

New!!: Multi-factor authentication and Bank card · See more »


Biometrics is the technical term for body measurements and calculations.

New!!: Multi-factor authentication and Biometrics · See more »

Client (computing)

A client is a piece of computer hardware or software that accesses a service made available by a server.

New!!: Multi-factor authentication and Client (computing) · See more »

Comparison of authentication solutions

Authentication is the act of confirming the truth of an attribute of a single piece of data (a datum) claimed true by an entity.

New!!: Multi-factor authentication and Comparison of authentication solutions · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Multi-factor authentication and Computer network · See more »


Examples of credentials include academic diplomas, academic degrees, certifications, security clearances, identification documents, badges, passwords, user names, keys, powers of attorney, and so on.

New!!: Multi-factor authentication and Credential · See more »

Credit unions in the United States

Credit unions in the United States serve 100 million members, comprising 43.7% of the economically active population.

New!!: Multi-factor authentication and Credit unions in the United States · See more »

Desktop computer

A desktop computer is a personal computer designed for regular use at a single location on or near a desk or table due to its size and power requirements.

New!!: Multi-factor authentication and Desktop computer · See more »

Facial recognition system

A facial recognition system is a technology capable of identifying or verifying a person from a digital image or a video frame from a video source.

New!!: Multi-factor authentication and Facial recognition system · See more »

Federal Financial Institutions Examination Council

The Federal Financial Institutions Examination Council (FFIEC) is a formal U.S. government interagency body composed of five banking regulators that is "empowered to prescribe uniform principles, standards, and report forms to promote uniformity in the supervision of financial institutions".

New!!: Multi-factor authentication and Federal Financial Institutions Examination Council · See more »


A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.

New!!: Multi-factor authentication and Fingerprint · See more »


In law, fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a victim of a legal right.

New!!: Multi-factor authentication and Fraud · See more »

Identity management

Identity management, also known as identity and access management (IAM) is, in computer security, the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons".

New!!: Multi-factor authentication and Identity management · See more »

Identity theft

Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.

New!!: Multi-factor authentication and Identity theft · See more »

Iris recognition

Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance.

New!!: Multi-factor authentication and Iris recognition · See more »

Keystroke dynamics

Keystroke dynamics, keystroke biometrics, typing dynamics and lately typing biometrics, is the detailed timing information which describes exactly when each key was pressed and when it was released as a person is typing at a computer keyboard.

New!!: Multi-factor authentication and Keystroke dynamics · See more »

Knowledge-based authentication

Knowledge-based authentication, commonly referred to as KBA, is a method of authentication which seeks to prove the identity of someone accessing a service such as a financial institution or website.

New!!: Multi-factor authentication and Knowledge-based authentication · See more »


A laptop, also called a notebook computer or just notebook, is a small, portable personal computer with a "clamshell" form factor, having, typically, a thin LCD or LED computer screen mounted on the inside of the upper lid of the "clamshell" and an alphanumeric keyboard on the inside of the lower lid.

New!!: Multi-factor authentication and Laptop · See more »


A machine uses power to apply forces and control movement to perform an intended action.

New!!: Multi-factor authentication and Machine · See more »


Man-in-the-browser (MITB, MitB, MIB, MiB), a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host web application.

New!!: Multi-factor authentication and Man-in-the-browser · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

New!!: Multi-factor authentication and Man-in-the-middle attack · See more »


Memory is the faculty of the mind by which information is encoded, stored, and retrieved.

New!!: Multi-factor authentication and Memory · See more »

Mobile app

A mobile app is a computer program designed to run on a mobile device such as a phone/tablet or watch.

New!!: Multi-factor authentication and Mobile app · See more »

Mobile phone

A mobile phone, known as a cell phone in North America, is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.

New!!: Multi-factor authentication and Mobile phone · See more »

Mobile phone spam

Mobile phone spam is a form of spam (unsolicited messages, especially advertising), directed at the text messaging or other communications services of mobile phones or smartphones.

New!!: Multi-factor authentication and Mobile phone spam · See more »

Multi-factor authentication

Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).

New!!: Multi-factor authentication and Multi-factor authentication · See more »

Mutual authentication

Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time, being a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS).

New!!: Multi-factor authentication and Mutual authentication · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Multi-factor authentication and National Institute of Standards and Technology · See more »

Online banking

Online banking, also known as internet banking, it is an electronic payment system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institution's website.

New!!: Multi-factor authentication and Online banking · See more »


Out-of-band is activity outside a defined telecommunications frequency band, or, metaphorically, outside some other kind of activity.

New!!: Multi-factor authentication and Out-of-band · See more »


A passphrase is a sequence of words or other text used to control access to a computer system, program or data.

New!!: Multi-factor authentication and Passphrase · See more »


A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Multi-factor authentication and Password · See more »

Payment card industry

The payment card industry (PCI) denotes the debit, credit, prepaid, e-purse, ATM, and POS cards and associated businesses.

New!!: Multi-factor authentication and Payment card industry · See more »

Personal digital assistant

A personal digital assistant (PDA), also known as a handheld PC, is a variety mobile device which functions as a personal information manager.

New!!: Multi-factor authentication and Personal digital assistant · See more »

Personal identification number

A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.

New!!: Multi-factor authentication and Personal identification number · See more »


Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Multi-factor authentication and Phishing · See more »

Phone cloning

Phone cloning is the copying of identity from one cellular device to another.

New!!: Multi-factor authentication and Phone cloning · See more »

Radio-frequency identification

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.

New!!: Multi-factor authentication and Radio-frequency identification · See more »

Reliance authentication

Reliance authentication is a part of the trust-based identity attribution process whereby a second entity relies upon the authentication processes put in place by a first entity.

New!!: Multi-factor authentication and Reliance authentication · See more »

Security token

Security tokens are physical devices used to gain access to an electronically restricted resource.

New!!: Multi-factor authentication and Security token · See more »

Signalling System No. 7

Signaling System No.

New!!: Multi-factor authentication and Signalling System No. 7 · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Multi-factor authentication and Smart card · See more »


SMS (short message service) is a text messaging service component of most telephone, internet, and mobile-device systems.

New!!: Multi-factor authentication and SMS · See more »

Social engineering (security)

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

New!!: Multi-factor authentication and Social engineering (security) · See more »


Computer software, or simply software, is a generic term that refers to a collection of data or computer instructions that tell the computer how to work, in contrast to the physical hardware from which the system is built, that actually performs the work.

New!!: Multi-factor authentication and Software · See more »

Software token

A software token (a.k.a. soft token) is a type of two-factor authentication security device that may be used to authorize the use of computer services.

New!!: Multi-factor authentication and Software token · See more »

Speaker recognition

Speaker recognition is the identification of a person from characteristics of voices (voice biometrics).

New!!: Multi-factor authentication and Speaker recognition · See more »

Strong authentication

Strong authentication is a notion with several unofficial definitions.

New!!: Multi-factor authentication and Strong authentication · See more »

The Verge

The Verge is an American technology news and media network operated by Vox Media.

New!!: Multi-factor authentication and The Verge · See more »

Time-based One-time Password algorithm

The Time-based One-Time Password algorithm (TOTP) is an algorithm that computes a one-time password from a shared secret key and the current time.

New!!: Multi-factor authentication and Time-based One-time Password algorithm · See more »

Transaction authentication number

A transaction authentication number (TAN) is used by some online banking services as a form of single use one-time passwords to authorize financial transactions.

New!!: Multi-factor authentication and Transaction authentication number · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Multi-factor authentication and Trojan horse (computing) · See more »

United States

The United States of America (USA), commonly known as the United States (U.S.) or America, is a federal republic composed of 50 states, a federal district, five major self-governing territories, and various possessions.

New!!: Multi-factor authentication and United States · See more »

User (computing)

A user is a person who utilizes a computer or network service.

New!!: Multi-factor authentication and User (computing) · See more »

Virtual private network

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

New!!: Multi-factor authentication and Virtual private network · See more »

Web page

A web page (also written as webpage) is a document that is suitable for the World Wide Web and web browsers.

New!!: Multi-factor authentication and Web page · See more »

World Wide Web

The World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and accessible via the Internet.

New!!: Multi-factor authentication and World Wide Web · See more »

Redirects here:

2 factor authentication, 2 step verification, 2-factor authentication, 2-step verification, 2FA, Dual Factor Authentication, Dual factor authentication, Dual-factor authentication, Hard token, Multifactor Authentication, Multifactor authentication, Out-of-band authentication, Soft token, T-FA, Three Factor Authentication, Two Factor Authentication, Two factor, Two factor auth, Two factor authentication, Two-Factor, Two-factor, Two-factor auth, Two-factor authentication, Two-step authorization, Two-step verification.


[1] https://en.wikipedia.org/wiki/Multi-factor_authentication

Hey! We are on Facebook now! »