Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Multi-Factor Authentication

An authentication approach combining two or more independent credentials to verify a user's identity.

Multi-factor authentication (often abbreviated MFA or 2FA) is an authentication method that requires users to verify their identity using two or more independent factors. These factors are drawn from three categories: knowledge factors (passwords, PINs, security questions), possession factors (phones, hardware tokens, smart cards), and inherence factors (biometrics like fingerprints or facial recognition).

How It Works

Single-factor authentication — typically a password — provides only one barrier between an attacker and an account. If the password is weak, reused, or compromised in a data breach, the account is exposed. Multi-factor authentication adds additional verification steps that remain effective even when the password is compromised.

The most widely deployed implementation pairs a password with a time-based one-time password (TOTP). After entering their password, the user opens an authenticator application that generates a six-digit code based on a shared secret and the current time. This code changes every 30 seconds, so even if intercepted, it cannot be reused. SMS-based codes offer a similar experience but are less secure due to vulnerabilities in cellular networks that allow SIM swapping and interception.

Hardware security keys represent the strongest form of multi-factor authentication currently available. Using standards like FIDO2 and WebAuthn, these devices perform cryptographic challenge-response authentication that is bound to the specific website's origin. This makes them resistant to phishing because the key will not authenticate against a spoofed domain, regardless of how convincing the phishing page appears.

Adaptive authentication systems evaluate additional contextual signals — device fingerprints, geographic location, login time patterns, and network reputation — to determine the level of verification required. Familiar patterns may require only a password, while anomalous patterns trigger additional factors.

Why It Matters

Credential theft is the single most common initial access vector in security breaches. Multi-factor authentication transforms stolen credentials from a complete compromise into a partial one. Organizations that enforce multi-factor authentication across all accounts dramatically reduce their exposure to phishing, credential stuffing, and brute-force attacks.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment