{"id":261040,"date":"2022-06-21T15:33:31","date_gmt":"2022-06-21T12:33:31","guid":{"rendered":"https:\/\/shop.thekernel.ua\/what-is-multifactor-authentication"},"modified":"2023-06-22T18:08:15","modified_gmt":"2023-06-22T15:08:15","slug":"what-is-multifactor-authentication","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/what-is-multifactor-authentication","title":{"rendered":"What is multifactor authentication?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.1&#8243; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2019\/05\/Security-Key-NFC-by-Yubico-Laptop-1030&#215;687.jpg&#8221; parallax=&#8221;on&#8221; min_height=&#8221;610px&#8221; custom_margin=&#8221;-180px||-3px||false|false&#8221; custom_padding=&#8221;37px||22px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|auto|0px|auto|false|false&#8221; custom_padding=&#8221;146px||0px|||&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;84px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_font=&#8221;|900|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;65px&#8221; text_letter_spacing=&#8221;2px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;|800|||||||&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;65px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;49px&#8221; text_font_size_phone=&#8221;38px&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height_tablet=&#8221;1.8em&#8221; text_line_height_phone=&#8221;1.8em&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; text_text_shadow_style=&#8221;preset1&#8243; header_text_shadow_style=&#8221;preset1&#8243; text_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><b>What is multifactor authentication? <\/b><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin_tablet=&#8221;&#8221; custom_margin_phone=&#8221;|5.1%||3%|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>What is multifactor authentication and when is it appropriate to use it<\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\"><\/span><span style=\"font-weight: 400;\">Account protection with the help of one factor \u2013 a complex password \u2013 ceased to be reliable about two decades ago. Therefore, network users are recommended to use additional protection factors. Moreover, now there is an opportunity to choose the best option according to requests, price and quality.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And taking into account the fact that the pandemic has left its mark on many spheres of social life, remote work has become a trend &#8211; the previously favorite format of IT companies, and now web, marketing studios, educational resources, call centers and other enterprises, where tasks for 80- 90% are carried out with the help of computers. However, the nuance is that home PCs, on which employees most often continue to work remotely, need the same protection as corporate devices where appropriate software can be installed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to avoid the leakage of corporate information, such IT corporations as Google and Facebook have long made it mandatory for members of the organization to connect<\/span> <span style=\"font-weight: 400;\">multi-factor authentication<\/span> <span style=\"font-weight: 400;\">or<\/span> <span style=\"font-weight: 400;\">MFA<\/span> <span style=\"font-weight: 400;\">(abbreviated) precisely<\/span> <span style=\"font-weight: 400;\">with the help<\/span> <span style=\"font-weight: 400;\">of tokens<\/span><span style=\"font-weight: 400;\">. Why not follow their example? <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we will consider<\/span> <span style=\"font-weight: 400;\">what multifactor authentication is,<\/span> <span style=\"font-weight: 400;\">how it works, its advantages and disadvantages, and what are the options for its connection.<\/span><\/p>\n<h2><b>Definition<\/b> <b>of MFA<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">This is multi-factor authentication<\/span><span style=\"font-weight: 400;\"> extended verification of account belonging to the user, which includes more than one factor. Factors are understood as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>knowledge factor<\/b> <span style=\"font-weight: 400;\">\u2014 information known to the subject \u2014 PIN code, password, control word, answer to a secret question;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>\u0444\u0430\u043a\u0442\u043e\u0440 \u0432\u043b\u0430\u0434\u0435\u043d\u0438\u044f<\/b><span style=\"font-weight: 400;\">\u2014 a thing owned by the user \u2014<\/span> <span style=\"font-weight: 400;\">phone<\/span><span style=\"font-weight: 400;\">, tablet, PC, security token, smart card;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>property factor<\/b> <span style=\"font-weight: 400;\">\u2014 biological characteristics of the subject\u2014fingerprint or palm, iris, voice, face.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Often, multifactor authentication (MFA) is used in the meaning of<\/span> <a href=\"https:\/\/shop.thekernel.ua\/en\/two-factor-authentication\"><span style=\"font-weight: 400;\">two-factor authentication (2FA)<\/span><\/a><span style=\"font-weight: 400;\">, which is not a mistake.<\/span><\/p>\n<p><b>The advantages of multifactor authentication<\/b> <span style=\"font-weight: 400;\">come down to<\/span> <span style=\"font-weight: 400;\">cybersecurity<\/span><span style=\"font-weight: 400;\">, it is:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">additional protection against unauthorized access to confidential or corporate information;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">safe conduct of banking operations;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">confidence in data security on servers.<\/span><\/li>\n<\/ul>\n<p><b>To the disadvantages<\/b> <b>of MFA<\/b> <span style=\"font-weight: 400;\">consider the difficulty of use for untrained users. Many simply do not understand <\/span><span style=\"font-weight: 400;\">why use multifactor authentication<\/span> <span style=\"font-weight: 400;\">(we will return to this question a little later).<\/span> <span style=\"font-weight: 400;\">Therefore, unfortunately, at the moment, the prevalence of this security method is at the level of 10%.<\/span><\/p>\n<h2><b>How multifactor authentication works<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">The principle of operation<\/span> <span style=\"font-weight: 400;\">of multifactor authentication<\/span> <span style=\"font-weight: 400;\">is that when<\/span> <span style=\"font-weight: 400;\">the user<\/span> <span style=\"font-weight: 400;\">is authorized<\/span> <span style=\"font-weight: 400;\">in the operating system or in any account, the service requests&#8217; confirmation of identity with the help of additional factors available to the user.<\/span> <\/p>\n<p><b>Examples of multifactor authentication<\/b><b>:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">confirmation of identity with the help of a one-time password (OTP), which can be sent by the service to the user in several ways: via SMS, mail, application, or<\/span> <span style=\"font-weight: 400;\">token<\/span><span style=\"font-weight: 400;\">;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">performing an action on an additional device: pressing the confirmation button, entering a code, speaking a phrase, connecting a USB key, scanning a fingerprint.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Different platforms support different<\/span> <span style=\"font-weight: 400;\">types of multifactor authentication<\/span><span style=\"font-weight: 400;\">. As a rule, after logging into the account, they can be selected and configured in the \u201cSecurity\u201d tab.<\/span><\/p>\n<h2><b>When it is appropriate to use multi-factor authentication<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">As we mentioned at the beginning of the article,<\/span> <span style=\"font-weight: 400;\">multifactor authentication<\/span><span style=\"font-weight: 400;\"> has long been used by IT companies not only as a recommendation, but also as a mandatory measure for remote workers. However, we want to pay special attention to cases when it is necessary <\/span><span style=\"font-weight: 400;\">MFA for Business.<\/span> <span style=\"font-weight: 400;\">Especially when<\/span> <span style=\"font-weight: 400;\">remote employees need to connect to a workstation via<\/span> <span style=\"font-weight: 400;\">RDP<\/span> <span style=\"font-weight: 400;\">(remote desktop protocol implemented using Microsoft Remote Desktop, or VNC, TeamViewer, and other programs).<\/span><span style=\"font-weight: 400;\"> <\/span><\/p>\n<p><span style=\"font-weight: 400;\">After all, if attackers get access to the administrator&#8217;s account, they can seriously offend:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">send letters to the database on behalf of your organization;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">seize developments, strategic plans, other intellectual property and sell it to competitors;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">encrypt all the company&#8217;s files in order to demand a ransom in the future.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To protect access via<\/span> <span style=\"font-weight: 400;\">RDP<\/span><span style=\"font-weight: 400;\">, we recommend the following methods:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Close<\/span> <span style=\"font-weight: 400;\">RDP access<\/span> <span style=\"font-weight: 400;\">for external IP addresses, left the connection option only for IP addresses of employees. For dynamic IP addresses of home networks, it is possible to create \u201cwhite lists\u201d by subnet.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It will provide an additional level of protection \u2014<\/span> <span style=\"font-weight: 400;\">multifactor authentication<\/span> <span style=\"font-weight: 400;\">for<\/span> <span style=\"font-weight: 400;\">RDP<\/span> <span style=\"font-weight: 400;\">or all employees entering accounts from other devices.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The feasibility of using multi-factor authentication can also be traced using the table:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Degree of risk<\/b><\/td>\n<td><b>Example of use<\/b><\/td>\n<td><b>Authentication methods<\/b><\/td>\n<\/tr>\n<tr>\n<td><b>Low<\/b> <span style=\"font-weight: 400;\">\u2013 the consequences of hacking will lead to minor damage<\/span><\/td>\n<td><span style=\"font-weight: 400;\">New registration on the site of a separate user<\/span><\/td>\n<td><span style=\"font-weight: 400;\">It is enough to use a complex multiple-use password <\/span><\/td>\n<\/tr>\n<tr>\n<td><b>Medium<\/b> <span style=\"font-weight: 400;\">\u2013 in case of password theft, the damage will be noticeable, but not critical<\/span><\/td>\n<td><span style=\"font-weight: 400;\">The subject&#8217;s use of banking or accounts in online stores tied to bank cards<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Additional protection in the form of two-step or two-factor authentication is required<\/span><\/td>\n<\/tr>\n<tr>\n<td><b>High<\/b> <span style=\"font-weight: 400;\">\u2013<\/span> <span style=\"font-weight: 400;\">leakage of information can lead to colossal negative consequences<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Conducting large interbank operations by financiers<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Multi-factor authentication is required<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<p>&nbsp;<\/p>\n<h2><b>Reliability<\/b> <b>of multifactor authentication<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">Unfortunately, multifactor authentication is not 100% secure in all cases, as much depends on the choice of authentication methods and the safety of the primary password. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">About how<\/span> <a href=\"https:\/\/shop.thekernel.ua\/ru\/kak-zashchytyt-parol-ot-krazhy\"><span style=\"font-weight: 400;\">to protect your password from theft<\/span><\/a><span style=\"font-weight: 400;\">, we told last time. Now we will discuss the reliability and convenience of additional authentication methods:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>SMS, E-mail passwords \u2013 may be intercepted<\/b><span style=\"font-weight: 400;\">; they may not be very convenient to use if the input needs to be performed on the same device where the message arrived, in any case, not all users can deal with tabs;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>a voice call on a mobile phone is not very reliable<\/b><span style=\"font-weight: 400;\">, as criminals can order a duplicate SIM card and receive calls on it; moreover, unexpectedly <\/span><b>a loud ring may interfere<\/b><span style=\"font-weight: 400;\">, if you enter the account at work, in a co-working space or at home, but at night, or vice versa, the voice notification may not be heard in a noisy place;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>applications that generate one-time OTP-passwords<\/b> <span style=\"font-weight: 400;\">every 30 seconds are<\/span> <b>a reliable factor<\/b><span style=\"font-weight: 400;\">, but they work correctly only when connected to the network;<\/span> <a href=\"https:\/\/shop.thekernel.ua\/ru\/kak-zashchytyt-parol-ot-krazhy\"><span style=\"font-weight: 400;\">if you are connected to a common Wi-Fi network<\/span><\/a><span style=\"font-weight: 400;\">, the reliability of the method is in doubt;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>the \u201cYes, it&#8217;s me\u201d<\/b> <span style=\"font-weight: 400;\">confirmation button<\/span> <b>will not help<\/b> <span style=\"font-weight: 400;\">if the device is lost;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Tokens<\/b> <b>or hardware security keys<\/b> <span style=\"font-weight: 400;\">are<\/span> <b>reliably<\/b> <span style=\"font-weight: 400;\">provided you use a certified product; unlike other authorization methods, they are even more<\/span> <b>convenient to use<\/b><span style=\"font-weight: 400;\">, especially if you choose a good manufacturer, for example, YubiKey;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>biometric verification factors<\/b> <span style=\"font-weight: 400;\">are reliable<\/span><b>, provided<\/b> <span style=\"font-weight: 400;\">that the devices work autonomously and do not transmit biometric data to the server, sending it only in encrypted form; otherwise they can be stolen, just like passwords.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Each of the listed factors requires competent application. As a rule, you need to protect both passwords and devices that you can use for verification. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The exception is YubiKey hardware security keys manufactured in Sweden and the USA, which are already supported by thousands of services. In case of their theft, criminals will still not be able to use them, especially <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/shop\/yubikey-bio-fido-edition\"><span style=\"font-weight: 400;\">the YubiKey Bio novelty is FIDO<\/span><\/a><span style=\"font-weight: 400;\"> with a fingerprint scanner. It is not for nothing that YubiKey keys are preferred by users in 160 countries of the world!<\/span><\/p>\n<p><b>To learn more about YubiKey security keys and their capabilities, contact our managers.<\/b><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_slider include_categories=&#8221;380&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/04\/090f3141-scaled.jpg&#8221; custom_margin=&#8221;||-85px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_slider][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is multifactor authentication? What is multifactor authentication and when is it appropriate to use it Account protection with the help of one factor \u2013 a complex password \u2013 ceased to be reliable about two decades ago. Therefore, network users are recommended to use additional protection factors. Moreover, now there is an opportunity to choose [&hellip;]<\/p>\n","protected":false},"author":42,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"What is multifactor authentication and when is it appropriate to use it","_seopress_titles_desc":"In the article, we understand what multifactor authentication is and when it is used.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[403,437],"tags":[],"class_list":["post-261040","post","type-post","status-publish","format-standard","hentry","category-articles","category-articles-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=261040"}],"version-history":[{"count":2,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261040\/revisions"}],"predecessor-version":[{"id":261042,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/261040\/revisions\/261042"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=261040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=261040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=261040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}