Two-Factor Authentication
Security Method
Overview
Use caseauthentication security enhancement
Technical
Also see
Knowledge graph stats
Claims38
Avg confidence92%
Avg freshness100%
Last updatedUpdated 5 days ago
WikidataQ2946402
Trust distribution
100% unverified
Governance
Not assessed
Two-Factor Authentication
concept
Security process requiring two different authentication factors to verify user identity before access.
Compare with...primary use case
| Value | Trust | Confidence | Freshness | Sources |
|---|---|---|---|---|
| authentication security enhancement | ○Unverified | High | Fresh | 1 |
| enhancing account security by requiring two forms of authentication | ○Unverified | High | Fresh | 1 |
| authentication security method requiring two different verification factors | ○Unverified | High | Fresh | 1 |
| Authentication security enhancement by requiring two different authentication factors | ○Unverified | High | Fresh | 1 |
| authentication security mechanism requiring two different verification factors | ○Unverified | High | Fresh | 1 |
requires
| Value | Trust | Confidence | Freshness | Sources |
|---|---|---|---|---|
| primary authentication factor | ○Unverified | High | Fresh | 1 |
| at least two different authentication factors | ○Unverified | High | Fresh | 1 |
| Something you know and something you have authentication factors | ○Unverified | High | Fresh | 1 |
| something you know and something you have | ○Unverified | High | Fresh | 1 |
part of
| Value | Trust | Confidence | Freshness | Sources |
|---|---|---|---|---|
| multi-factor authentication systems | ○Unverified | High | Fresh | 1 |
based on
| Value | Trust | Confidence | Freshness | Sources |
|---|---|---|---|---|
| multi-factor authentication principle | ○Unverified | High | Fresh | 1 |
| something you know and something you have principle | ○Unverified | High | Fresh | 1 |
| something you know, something you have, something you are authentication factors | ○Unverified | High | Fresh | 1 |
| multi-factor authentication principles | ○Unverified | High | Fresh | 1 |
reduces risk of
| Value | Trust | Confidence | Freshness | Sources |
|---|---|---|---|---|
| password-only attacks | ○Unverified | High | Fresh | 1 |
alternative to
| Value | Trust | Confidence | Freshness | Sources |
|---|---|---|---|---|
| single-factor authentication | ○Unverified | High | Fresh | 1 |
| Single-factor password authentication | ○Unverified | High | Fresh | 1 |
mitigates against
| Value | Trust | Confidence | Freshness | Sources |
|---|---|---|---|---|
| password-based attacks | ○Unverified | High | Fresh | 1 |
integrates with
| Value | Trust | Confidence | Freshness | Sources |
|---|---|---|---|---|
| Microsoft Authenticator | ○Unverified | High | Fresh | 1 |
| Google Authenticator | ○Unverified | High | Fresh | 1 |
| Authy | ○Unverified | High | Fresh | 1 |
| hardware security keys | ○Unverified | High | Fresh | 1 |
supports protocol
| Value | Trust | Confidence | Freshness | Sources |
|---|---|---|---|---|
| TOTP (Time-based One-Time Password) | ○Unverified | High | Fresh | 1 |
| HOTP (HMAC-based One-Time Password) | ○Unverified | High | Fresh | 1 |
| SMS-based verification | ○Unverified | Moderate | Fresh | 1 |
| SMS authentication | ○Unverified | Moderate | Fresh | 1 |
| SMS-based authentication | ○Unverified | Moderate | Fresh | 1 |
| FIDO U2F | ○Unverified | Moderate | Fresh | 1 |
| FIDO2/WebAuthn | ○Unverified | Moderate | Fresh | 1 |
| Push notification authentication | ○Unverified | Moderate | Fresh | 1 |
| WebAuthn | ○Unverified | Moderate | Fresh | 1 |
standardized by
| Value | Trust | Confidence | Freshness | Sources |
|---|---|---|---|---|
| NIST Special Publication 800-63B | ○Unverified | High | Fresh | 1 |
enhanced by
| Value | Trust | Confidence | Freshness | Sources |
|---|---|---|---|---|
| biometric authentication | ○Unverified | Moderate | Fresh | 1 |