Authing DocsDocuments
Concept
workflow
Guides
Development Integration
Application integration
Concept
workflow
Guides
Development Integration
Application integration
Old Version
Concept
  • What is Authing
  • What is the user pool
  • What is an application
  • What is certification
  • What is federal certification
  • What is authorization
  • Authentication vs authorization
  • What is JWT Token
  • What is ID Token
  • What is Access Token
  • What is Refresh Token
  • Access Token vs Id Token
  • OIDC FAQ
  • Understand the SAML2 protocol

  • Understand OIDC and OAuth2.0 protocol

  • What is multi-factor authentication
  • Account Lifecycle Management
  • Hosted login page vs embeddable login component
  • CIAM and EIAM
  • What is LDAP
  • Principle of Scan Code Login

¶ What is Multi-Factor Authentication (MFA)?

Update Time: 2025-02-18 09:00:47
Edit

Multi-Factor Authentication (MFA) is a very simple security authentication technique that can add an extra layer of protection in addition to the user name and password. After enabling MFA, when users perform operations, in addition to providing the user name and password (first authentication), they also need to perform a second authentication. MFA will provide more information for your account and resources with higher security protection.

For companies, the cost of data breach is getting worse. On the one hand, companies will be punished by regulatory authority. For example, British Airways was fined 204 million euros by the Information Commissioner's Office (ICO) for data breaches. On the other hand, once data leakage occurs, it will not only make the company lose the trust of customers and users, but also affect the company's long-term development.

Therefore, the use of MFA has become a basic solution for enterprises to prevent data leakage. MFA requires users to use at least two factors to verify their identity, and only after passing the verification can they access applications, which is rapidly spreading among enterprises.

Statistics also prove the effectiveness of MFA. At the end of last year, LastPass conducted a survey of 47,000 companies and found that 57% of companies worldwide are currently using MFA, an increase of 12% over the previous year. Earlier this year, Microsoft reported that 99.9% of its tracked offending accounts did not use MFA.

¶ The Core Functions of Authing MFA

  • Authing guarantees business security through multiple authentication methods;
  • Customize the authentication process, which is simple with one-touch open;
  • Support environmental data report for equipments and multi-dimensional analysis of security levels;
  • Support configuration strategy to achieve environmental risk self-adaptation;
  • Suitable for privilege control in APP;
  • Integrated into the universal login component (Guard) by default;
  • User data management, operation log query;
  • Provide SDK and open interfaces to help developers quickly call related capabilities(functions?) and build custom user management pages.

¶ The Methods of MFA

Authing provides multiple authentication methods to improve enterprises identity security.

¶ Phone Token

With strong dynamic OTP password verification, it helps protect account security and avoid malicious attacks.

¶ SMS/Email Verification Code

  • Easy to use
  • Convenient
  • Improve login security

¶ Compatible with Third-party Authenticators

Compatible with third-party authenticators, including but not limited to:

  • Google Authenticator
  • Microsoft Authenticator

¶ Biometrics

Fingerprint/face, as key factors of human body characteristics, is widely used in the field of security authentication.

¶ Graphic lock

  • Simple and easy to use;
  • Security can be enhanced with more complex graphics.

¶ Advantages of Authing MFA

¶ Developer-friendly

Provides an out-of-the-box SDK to help end-to-end developers to quickly implement MFA.

  • Support multiple terminals: Web、iOS、Android;
  • Built-in multiple MFA terminal components, such as OTP, verification code, fingerprint unlocking, facial recognition, graphic lock, etc.;
  • Only need to call a method to start the MFA certification component, get the certification result, and complete the certification process.

¶ Report Customized Data

Report customized data, participate in the process and initiate decision-making, and cover more complex and refined scenarios.

  • Support data reporting during Authing SDK initialization;
  • Support regular data reporting;
  • Support active data reporting when the application is running;

¶ Strategy-based MFA

The trigger conditions of MFA are based on custom strategies, and the strategy system is simple, efficient, complete and flexible.

  • Simple: If you don't want to configure a complicated strategy, you can use the default security strategy or default conditions;
  • Efficient: multi-factor authentication is immediately aroused under millisecond-level judgment strategy with a good user interface;
  • Completed: The strategy is described based on function expressions, and developers can obtain enough information (including but not limited to user information, equipment, network, location, behavior, custom report data, etc.) to think strategy and logic;
  • Flexible: Judgment can be made based on multiple methods at the same time.

¶ Simple Configuration

Based on a friendly user interface, quickly configure multi-factor authentication for specific applications.

  • One-click turn on/off multi-factor authentication;
  • One-click to enable the default security policy, without having to understand the policy configuration, can also greatly improve the security of the application;
  • Dozens of default, important and commonly used strategy to fit conditions, which will take effect upon selection and can be used by non-engineers.

¶ Adaptive MFA

Compared with traditional MFA, "adaptive" MFA can choose to apply different MFA methods according to the current security situation, which ensures security while also taking into account the user experience. "Adaptive" MFA provides a more flexible and intelligent verification strategy.

When the user is in the authentication process, the "adaptive" MFA generates multiple "key elements" for the currently logged-in user:

  • User attributes: such as user name, password, user identity and other attributes and information of the user;
  • Location awareness: Location awareness is divided into virtual location (IP address) and physical location (country, region, etc.);
  • Request source: Judge the source of the current user's request, such as: hardware device information, the user's current system, etc.;
  • Biometrics: Use the user's biological information for identification, such as fingerprint information, face recognition, etc.;
  • Behavior analysis: A series of user behaviors such as whether it comes from a frequently used login location, whether the wrong password is entered multiple times, and the user's previous operation records.
Prev: Select OIDC authorization mode Next: Account Lifecycle Management
  • The Core Functions of Authing MFA
  • The Methods of MFA
  • Advantages of Authing MFA
  • Adaptive MFA

User identity management

Integrated third-party login
Mobile phone number flash check (opens new window)
Universal login form component
Custom authentication process

Enterprise internal management

Single Sign On
Multi-factor Authentication
Authority Management

Developers

Development Document
Framework Integration
Blog (opens new window)
GitHub (opens new window)
Community User Center (opens new window)

Company

400 888 2106
sales@authing.cn
16 / F, Block B, NORTH STAR CENTURY CENTER, Beijing(Total)
room 406, 4th floor, zone B, building 1, No. 200, Tianfu Fifth Street, Chengdu(branch)

Beijing ICP No.19051205-1

© Beijing Steamory Technology Co.