Two-factor Authentication

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 5: Line 5:
Authentication is a recent verification of a principal (source).  A principal is someone connected to and participating on the network (source).  There are three main methods of authenticating a principal, known as human authentication factors.   
Authentication is a recent verification of a principal (source).  A principal is someone connected to and participating on the network (source).  There are three main methods of authenticating a principal, known as human authentication factors.   
-
===What the user has===
+
===Human Authentication Factors===
 +
What the user has
This can be something like a magnetic ID card or a drivers license that only that user owns.   
This can be something like a magnetic ID card or a drivers license that only that user owns.   
-
 
+
What the user knows
-
===What the user knows===
+
This is a piece of information that only the specific user being authenticated will know.  For example, this can include their PIN number, a user name and password or a random number.   
This is a piece of information that only the specific user being authenticated will know.  For example, this can include their PIN number, a user name and password or a random number.   
-
 
+
What the user is
-
===What the user is===
+
Consists mainly of biometrics, such as genetics, retinal scanning, or fingerprint identification.   
-
The focus of this is on biometrics, such as genetics, retinal scanning, or fingerprint identification.   
+
==Two-factor Authentication==
==Two-factor Authentication==
The definition of two-factor authentication must be further clarified.  When using two factors, it means that two out of the three of the above methods must be used.  This does ''not'' mean that a method can be used many times (two factor pdf).  For instance, when a system asks for 3 passwords, this does ''not'' qualify as two-factor, or 'strong', authentication.   
The definition of two-factor authentication must be further clarified.  When using two factors, it means that two out of the three of the above methods must be used.  This does ''not'' mean that a method can be used many times (two factor pdf).  For instance, when a system asks for 3 passwords, this does ''not'' qualify as two-factor, or 'strong', authentication.   
       Whenever only one factor is used, regardless of the number of times it is used, it is considered 'weak' authentication.
       Whenever only one factor is used, regardless of the number of times it is used, it is considered 'weak' authentication.

Revision as of 00:48, 9 April 2008

Contents

Two-factor Authentication

Two-factor authentication, also known as strong authentication, is a method which uses two different methods of authentication in order to verify a person's identity. It provides better verification then any single-factor authentication method on its own.

Authentication

Authentication is a recent verification of a principal (source). A principal is someone connected to and participating on the network (source). There are three main methods of authenticating a principal, known as human authentication factors.

Human Authentication Factors

What the user has This can be something like a magnetic ID card or a drivers license that only that user owns. What the user knows This is a piece of information that only the specific user being authenticated will know. For example, this can include their PIN number, a user name and password or a random number. What the user is Consists mainly of biometrics, such as genetics, retinal scanning, or fingerprint identification.

Two-factor Authentication

The definition of two-factor authentication must be further clarified. When using two factors, it means that two out of the three of the above methods must be used. This does not mean that a method can be used many times (two factor pdf). For instance, when a system asks for 3 passwords, this does not qualify as two-factor, or 'strong', authentication.

     Whenever only one factor is used, regardless of the number of times it is used, it is considered 'weak' authentication.
Personal tools