Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Last reviewed: May July 2015

What Is Two-Factor Authentication?

...

Tip
titleAdditional Resources

View recent presentations on access control and identity and access management in the EDUCAUSE library. For example, Check out Breaking the Ubiquitous Two-Factor Barrier, presented by Jane Drews (University of Iowa and Quinn Shamblin (Boston University) at the 2015 Security Professionals Conference. For other recent presentations visit access control and identity and access management in the EDUCAUSE library. 

Learn more about Two-Factor Authentication with Duo Push by visiting the Internet2 NET+ website.

Also see Client (Personal) Certificates: Should We Be Thinking About Certificate Use Cases or Should We Be Thinking About The Sort of Credential Deployment Model We Need? (a presentation at the 2011 Internet2 Member Meeting) for questions to ponder when considering deployment of two-factor authentication.

...

See Mobile One-Time-Passwords (OTP) and Google Authenticator, and DuoSecurity for information on implementation of OTP via mobile phones. Additional implementation options include:

  • SMS push to a preregistered device
  • Photograph-the-barcode-on-your-device's screen
  • Answer a call made to the individual's mobil phone and hit a specified key
  • Biometric voice verification

    Section
    bordertrue
    Column
    width50%30%

    Advantages:

    • Since most users are already carrying smartphones, it may be perceived as an easier or more convinient convenient way to authenticate than using tokens or smart cards
    • Compatible with a large number of applications
    • Easy to use
    Column
    width50%30%

    Disadvantages:

    • Relatively new technology, not as mature but gaining acceptance
    • Some confusion exists regarding the levels of two-factor strength of DTMF tones (out of band) vs one-time-passwords (in band) vs SMS (either or) and vendor available options
    • The possibility of cell phone cloning or interception
    • There may be locations/situations in which the use of smartphones may not be viable or functional (airplanes? basements?) or may be too expensive (e.g., when travelling overseas and paying international rates/roaming rates)
    Column
    width30%

    Who Is Using It (this is just a sample list):

2. Security Tokens

A small device that an individual possesses and controls used to authenticate the individual's identity. It provides the "what you have" component of two-factor authentication since it is used in addition to another piece of evidence (e.g., a password) to prove that individuals are who they claim to be. A token generates a unique code that is combined with an individual's password to create an electronic "ticket" that authenticates the individual and encrypts the transmission to ensure data integrity. Security tokens come in different types. The most common are:

...

Section
bordertrue
Column
width30%

Advantages:

  • Mature technology
  • Compatible with a large number of applications
  • Easy to carry
  • Strong second factor
Column
width30%

Disadvantages:

  • Easily lost and/or forgotten
  • Medium/high time and effort to deploy and maintain
  • Comparatively medium/high cost of ownership / deployment though purchase costs are declining. 
Column
width30%

Who Is Using It (this is just a sample list):

...

Section
bordertrue
Column
width30%

Advantages:

  • Comparatively lower cost of ownership / deployment
  • Compatible with a large number of applications
  • Easier to deploy than a hardware token
  • Strong second factor but not as strong as hardware token
Column
width30%

Disadvantages:

  • Some argue that a software token can be copied so they're not a true version of "something you have"
  • Can be time consuming to maintain
  • Software tokens stored on-devices are less secure than software tokens stored off-devices (e.g., hard tokens)
Column
width30%

Who Is Using It (this is just a sample list):

3. Smart Cards

A pocket-sized card, similar to credit card, with embedded integrated circuits that communicate with external devices via a card reader.

...

Section
bordertrue
Column
width30%

Advantages:

  • Easy to carry
  • Can be tied to physical security strategy (ID Badge)
  • Strong second factor with use of PIN
  • Use of encryption, therefore the information is more secure.
Column
width30%

Disadvantages:

  • Cards can be lost or stolen
  • Comparatively medium / high cost of ownership / deployment
  • Smartcards need card readers
Column
width30%

Who Is Using It (this is just a sample list):

4. Biometrics

The use of intrinsic physiological and behavioral characteristics to authenticate a particular individual. Most biometric-based authentication follows a four-step process:

...