Secure login

Mul­ti-fac­tor authen­ti­ca­tion is a secu­ri­ty pro­ce­dure in which a user pro­vides two dif­fer­ent fea­tures to iden­ti­fy them­selves. One of the fea­tures is usu­al­ly a phys­i­cal token, such as a secu­ri­ty code or an SMS.
Peo­ple like to talk about some­thing that „you have“ and some­thing that „you know”. A typ­i­cal exam­ple of two-fac­tor authen­ti­ca­tion is a QR code, while the PIN (per­son­al iden­ti­fi­ca­tion num­ber) forms the asso­ci­at­ed infor­ma­tion. The com­bi­na­tion of the two makes it more dif­fi­cult for a stranger to access the user’s data.

Mul­ti-fac­tor authen­ti­ca­tion for more secure connections

Mul­ti-fac­tor authen­ti­ca­tion cor­re­sponds to two-fac­tor authen­ti­ca­tion, where­by dif­fer­ent tokens can be used. This allows the user to choose which method suits them best. Mod­ern secu­ri­ty process­es often con­sist of a pass­word and bio­met­ric data such as a fin­ger­print or voice recognition.

An attack­er may suc­ceed in crack­ing a sin­gle authen­ti­ca­tion fac­tor, for exam­ple. For exam­ple, a thor­ough search of the victim’s envi­ron­ment can lead to the dis­cov­ery of an employ­ee ID card or a user ID with the cor­re­spond­ing pass­word that has end­ed up in the rub­bish. Or a care­less­ly dis­card­ed hard dri­ve may con­tain a pass­word data­base. How­ev­er, if oth­er fac­tors are required for authen­ti­ca­tion, the attack­er faces at least one more hur­dle to overcome.

The major­i­ty of today’s attacks are car­ried out via inter­net con­nec­tions. Mul­ti-fac­tor authen­ti­ca­tion can make these remote attacks far less dan­ger­ous because sim­ply crack­ing the pass­word is no longer enough to gain access. This is because it is very unlike­ly that the attack­er will also gain pos­ses­sion of the phys­i­cal device or code linked to the user account. Each addi­tion­al authen­ti­ca­tion fac­tor there­fore makes a sys­tem more secure. This is because the indi­vid­ual fac­tors are inde­pen­dent of each oth­er. If one of the fac­tors is com­pro­mised, this does not affect the others.

Bro­ker­Star and iOf­fice by WMC use mul­ti-fac­tor authen­ti­ca­tion from ver­sion 2.4.

Mul­ti-fac­tor authentication
Mul­ti-fac­tor authentication