Today, computers and smart devices are inexpensive enough that we can own many of them: smart phones, laptops, tablets and wearable micro devices. Our work and private lives demand portability. This, along with a trend towards moving enterprise servers into the cloud, makes secure user authentication even more imperative — and tricky. That brings us to multi-factor authentication: what it is and how it is achieved.
What Is Multi-Factor Authentication?
The goal of multi-factor authentication is to create a layered defense of two or more independent credentials: what you know (), what you have () and what you are (). Requiring multiple factors to authenticate a user makes it more difficult for an unauthorized person to gain access to computers, mobile devices, physical locations, networks or databases; each successive layer should help protect where other layers may be weak. In fact, multi-factor authentication , according to Microsoft.
Multi-factor authentication is becoming more common, particularly in the financial industry, and is advancing to include retina and fingerprint scanning, voice recognition and even facial recognition.
How Does Multi-Factor Authentication Add Security Benefits?
If only it were possible to develop a single method of authentication that was 100% accurate and could not be hacked, we wouldn’t need multi-factor authentication. But passwords can be seen, overheard, guessed or bypassed; a token can be lost or stolen; and an identical twin or using a photograph may even work to fool biological recognition systems. That is why multi-factor authentication is currently very important to account security.
The concept of security using multi-factor authentication is that, while there may be a weakness in one authentication factor — say, a stolen password or PIN — the strength of a second or third factor would compensate to provide proper authorization for access.
Setting Up Two-Factor Authentication for Your Account
To set up multi-factor authentication on your account, simply decide which option is right for you and then contact your account representative or our sales teams with the information below.
You have three options to set up two-factor authentication on your account. First, you can use Do Not Force which is an option you can turn on and off yourself, to control whether two-factor authentication is required. Second, you can enable Client Certificate which will automatically require all account users to complete a Management Console log-in by presenting their client certificate. Finally, you can enable a one-time password option. Learn more about each option.
Enterprise Customers:
sales@digicert.com or Sales Toll Free: 855-800-3444.
See CertCentral: Two-Factor Authentication.
Retail Customers:
Contact our Support Team
support@digicert.com or Direct Phone: 1-800-701-9600
What Multi-Factor Authentication Options Are Available for Mobile Devices?
One-time passwords
Applications are available that generate one-time passwords in the same way that have operated in the past. The one-time password is generated and sent to the mobile device using a time-based SMS.
Using a smartphone or tablet eliminates the need for a user to keep track of a token, and companies incur less cost replacing lost tokens, activating tokens for new employees or deactivating tokens when an employee leaves.
Biometric authentication
Top smartphone manufacturers understand that security is a growing customer concern and have also started offering biometric authentication to ensure that only the authorized user can access the device. Each of these techniques has advantages and disadvantages.
Biometric Verification | Advantages | Disadvantages |
Fingerprint authentication | Individuals have unique fingerprints |
Requires integration with network access software |
Voice recognition | No extra hardware is necessary | Not effective in settings where the user must remain quiet, or with excessive background noise |
Facial recognition or retinal scanning | No extra hardware is necessary (when the device is equipped with a camera) |
Not effective in low light, and possible to defeat authentication with a photograph |
How Is Multi-Factor Authentication Implemented in the Cloud?
As data, communication, training, storage, server infrastructure and more are migrated to the cloud, IT admins must deal with the risks of moving beyond the more traditional on-premises server location. Multi-factor, random authentication for user access is essential to protect data in the cloud.
Microsoft, Google, Amazon Web Services, Facebook and Twitter — among others — all offer two-factor authentication for access to their cloud services, and some are extending to multi-factor authentication strategies.
Multi-Factor Authentication for Microsoft 365
Microsoft 365 requires a password to access applications on PCs, Macs and mobile devices. The admin tool automatically issues a random, 16-character token for users to sign in. When signed in, users are prompted to set up additional authentication.
Multi-Factor Authentication for Microsoft 365 using Microsoft Azure Active Directory
is an enterprise-level solution that requires users to correctly enter a password, and then acknowledge a phone call, text message or an app notification on their smartphone to authenticate and sign in.
What Is the Best Way to Implement Multi-Factor Authentication?
Using and supporting multi-factor tools requires that IT organizations coordinate and configure the enterprise infrastructure to get protected logins working properly. Most tools include various software agents that can protect VPNs, SharePoint servers, and database servers. As more traditional hardware-based onsite servers move into the cloud, most multi-factor solution vendors offer cloud and on-premise options. Customers are choosing offsite deployments more and more because of the support and management flexibility the cloud offers.
It’s important to evaluate multi-factor authentication products carefully to determine how each one differs subtly with regard to the desired deployment. Not every vendor can handle all scenarios equally well, and this is often a prime factor in product selection. Here are a few questions to ask when preparing to look more closely at multi-factor authentication products for a business:
What Are the Obstacles to Implementing Multi-Factor Authentication?
Making a business case for multifactor authentication clearly requires some advanced planning. There are many use cases for the technology that can be applied in different ways to different parts of an IT infrastructure. Understanding how multi-factor authentication will be used ahead of time will be helpful when it comes time .
Before you begin the task of picking a multi-factor authentication vendor, carefully consider the following possible obstacles to deployment:
The Future of Multi-Factor Authentication
Multi-factor authentication has become a more mainstream option for financial firms and other consumer-facing businesses. In a study done by , 57 percent of companies surveyed are currently using multi-factor authentication, and it is predicted that by the end of 2020 90 percent of enterprises will use multi-factor authentication.
As passwords become increasingly insecure, and as our mobile, cloud-based computing becomes more prevalent, multi-factor tools are finding use in just about every corner of the enterprise, especially where personal information is being consumed.
According to the LastPass study, “many businesses who encourage or require employees to use multi-factor authentication are likely to be significantly ahead of their peers when it comes to mitigating threats. In cybersecurity, doing the basics well often has the biggest impact on preventing the most common attacks, so expect to see more widespread usage of multi-factor authentication across sectors in the coming years.”