« Back to Glossary Index

What is Authentication?

Authentication is the process that verifies whether the information a person or entity provides about themselves is truthful. There are various methods for this. The sensitivity of the affected data and digital resources should determine which method users employ to confirm their identity.

Information Categories for Authentication

Knowledge Factors

These include information that the user knows, for example:

  • Passwords
  • One-time passcodes (OTPs)
  • Answers to security questions
  • Personal identification numbers (PINs)

Advantage: Easy to implement.

Disadvantage: Users can forget the information or it can be stolen.

Possession Factors

These include objects that the user possesses:

  • Key fobs
  • Smart cards
  • Mobile devices
  • Hardware tokens

Advantage: Cannot be stolen remotely.

Disadvantage: An alternative is required in case of defect or loss.

Inherence Factors

These refer to physical or behavioral characteristics of the user:

  • Fingerprint
  • Voice recognition
  • Iris scan
  • Facial recognition
  • Handwriting

Advantage: Unforgettable.

Disadvantage: May only work with specific devices.

Authentication Methods

There are various methods and technologies for authenticating users. Two different objectives must be balanced: On the one hand, sensitive data should be protected as effectively as possible. On the other hand, user-friendliness plays a role, as users should not have to overcome unnecessary hurdles.

The most common methods include:

  • Single-Factor Authentication (SFA): Only a single factor is used here.
  • Two-Factor Authentication (2FA): This method combines two factors from different categories.
  • Multi-Factor Authentication (MFA): The user must use multiple factors to identify themselves. This further increases security.
  • Passwordless: Methods that do not require passwords to confirm identity.
  • Risk-based: Verification is performed based on a risk analysis that grants or denies access depending on the determined risk.
  • Certificate-based: Digital certificates confirm possession of a private key, allowing users to verify their identity with it.
  • Token-based: Users receive a token after verification that allows access to specific resources for a limited time.
  • Single Sign-On (SSO): Here, users can log in to multiple applications and services with a single set of credentials.
« Back to Glossary Index WordPress Cookie Notice by Real Cookie Banner