Multi-Factor Authentication
MFA is a security mechanism that requires users to verify their identity using two or more independent authentication factors from different categories before gaining access to a system or resource.
The AAA Framework
MFA operates within the broader AAA security framework:
Authentication
Verifying the claimed identity — "Who are you?"
Authorization
Determining what access is permitted — "What can you do?"
Accounting
Recording actions for audit and compliance — "What did you do?"
Why Passwords Alone Fail
Phishing
Deceptive sites or emails capture credentials without the user's awareness.
Data Breaches
Credential databases are stolen and sold on dark web markets.
Password Reuse
One breach compromises multiple accounts using the same credentials.
Brute Force
Automated tools test millions of password combinations per second.
Social Engineering
Attackers manipulate people into revealing credentials directly.
Shoulder Surfing
Passwords observed physically in public spaces or via camera.
Learning Objectives
After completing this lesson, you will be able to:
- Distinguish the three primary authentication factor categories
- Compare specific MFA mechanisms (TOTP, FIDO2, push notifications)
- Differentiate true MFA from two-step verification
- Analyze common attack vectors and identify which MFA methods resist them
- Apply the AAA framework to authentication design decisions
The Three Factor Categories
Authentication factors fall into three distinct categories based on their nature. True MFA requires factors from at least two different categories.
Knowledge factors rely on information only the legitimate user should possess. They are the most widely deployed factor type but also the most frequently compromised.
Examples
Passwords
Alphanumeric strings; most common but most frequently stolen or guessed.
PINs
Short numeric codes; faster to enter but lower entropy than passwords.
Security Questions
Answers to personal questions; often guessable via social media research.
Passphrases
Long sequences of random words; high entropy, easier to remember than random strings.
Strengths
- No physical token required — users always have their memory
- Easy to change if compromised
- Universal support across all platforms
- Zero hardware cost
Vulnerabilities
- Phishing and social engineering attacks
- Brute force and dictionary attacks
- Keyloggers and screen capture malware
- Database breaches expose hashed credentials
- Credential stuffing using leaked password lists
Possession factors require the user to physically have a device or token. Unlike knowledge factors, they cannot be stolen remotely without also compromising the physical object.
Examples
Hardware Security Keys
YubiKey and similar devices using FIDO2/WebAuthn. Phishing-resistant by design.
TOTP Authenticator Apps
Google Authenticator, Authy, Microsoft Authenticator — generate time-based codes.
SMS OTP
One-time codes via text message. Convenient but vulnerable to SIM swapping.
Smart Cards / PIV
PKI certificates stored on chip cards; widely used in government and enterprise.
Push Notifications
Approve/deny prompts sent to a registered mobile device via app.
Strengths
- Cannot be stolen without physical access to the device
- Hardware keys are phishing-resistant (domain-bound)
- TOTP codes are short-lived (30-second window)
- Widely supported as a second factor
Vulnerabilities
- Physical loss or theft of the device
- SMS OTP vulnerable to SIM swapping attacks
- TOTP susceptible to real-time phishing (attacker relays code immediately)
- Push notification fatigue attacks (MFA bombing)
- Backup code theft if stored insecurely
Inherence factors are based on the user's unique biological or behavioral characteristics. Also called biometrics, these factors leverage traits that are difficult to replicate or transfer.
Examples
Fingerprint
Widely deployed on smartphones. Extremely fast and convenient.
Face Recognition
2D/3D facial mapping; Face ID uses IR depth sensing for liveness detection.
Iris / Retina Scan
Highly accurate; complex vasculature unique to each individual.
Voice Print
Voice pattern analysis; behavioral and physiological factors combined.
Strengths
- Cannot be forgotten or lost
- Difficult to transfer or share with others
- Fast authentication experience for users
- Some biometrics are extremely difficult to spoof
Vulnerabilities
- Cannot be "changed" if compromised (unlike passwords)
- Fingerprints can be lifted from surfaces and replicated
- Face recognition susceptible to deepfake attacks in some implementations
- Environmental factors (injury, illness) affect recognition accuracy
- False positive/negative rates vary by implementation quality
- Privacy and regulatory concerns (BIPA, GDPR)
Advanced & Adaptive Factors
Beyond the three core categories, modern authentication systems layer additional context signals to create risk-aware, adaptive security.
Location-Based Authentication
Location Signals Used
- GPS coordinates — device-reported location (spoofable)
- IP geolocation — approximate location from network address
- Network context — corporate VPN, trusted Wi-Fi, known office subnet
- Geo-velocity — impossible travel detection (login from NYC then Tokyo 20 min later)
- Country allow/block lists — restrict access from high-risk regions
Behavioral Biometrics
Behavioral biometrics continuously analyze how a user interacts with a device, creating a dynamic authentication signal that doesn't require explicit action from the user.
Keystroke Dynamics
Typing rhythm, dwell time, flight time between keys — creates a unique typing fingerprint.
Mouse Movement
Cursor path patterns, click speed, scroll behavior — subtle but statistically distinctive.
Touch Patterns
Swipe speed, pressure, finger angle — unique to each individual's touch behavior.
Navigation Behavior
How the user navigates the application — page sequence, dwell times, interaction patterns.
Adaptive / Risk-Based MFA
Adaptive MFA dynamically adjusts authentication requirements based on real-time risk assessment. Low-risk access may require only one factor; high-risk signals trigger additional verification steps.
Risk Signals Evaluated
Device Trust
Is this a registered, managed, compliant device? MDM enrollment status?
Network Context
Corporate intranet vs. public Wi-Fi vs. Tor exit node?
Login Time
Is this access attempt within normal working hours for this user?
Threat Intelligence
Is the IP address listed in threat feeds? Known bad actor?
Resource Sensitivity
Accessing payroll data vs. viewing public announcements — different risk levels.
Behavioral Anomaly
Does this session deviate from the user's established behavioral baseline?
MFA Mechanisms & Protocols
Different MFA implementations offer varying levels of security, usability, and phishing resistance. Understanding the trade-offs helps in selecting the right mechanism for a given context.
| Mechanism | Type | Phishing Resistant | Offline | Use Case |
|---|---|---|---|---|
| TOTP | Possession | ⚠ Partial | ✓ Yes | Consumer accounts, apps |
| FIDO2 / WebAuthn | Possession | ✓ Yes | ✓ Yes | Enterprise, high-security web apps |
| Push Notification | Possession | ⚠ Partial | ✗ No | Enterprise SSO, workforce apps |
| SMS OTP | Possession | ⚠ Partial | ✗ No | Consumer fallback (weak) |
| Smart Card / PIV | Possession | ✓ Yes | ✓ Yes | Government, regulated industries |
| Passkeys | Possession + Inherence | ✓ Yes | ✓ Yes | Passwordless future, modern apps |
TOTP — Time-Based One-Time Passwords
TOTP (RFC 6238) generates a short-lived numeric code using a shared secret key and the current Unix timestamp. Codes are valid for a 30-second window.
FIDO2 / WebAuthn
FIDO2 uses public-key cryptography. During registration, the authenticator generates a key pair; the private key never leaves the device. During authentication, the authenticator signs a challenge from the server. The signature is domain-bound, making phishing cryptographically impossible.
bank.com). A phishing site at b4nk.com would receive a signature that fails verification — the attack is structurally impossible, not just detected.
True MFA vs Two-Step Verification
These terms are often used interchangeably, but they describe meaningfully different security architectures. The distinction matters for compliance and threat modeling.
✓ True MFA
- Password (Knowledge) + YubiKey (Possession)
- PIN (Knowledge) + Fingerprint (Inherence)
- Password (Knowledge) + TOTP App (Possession)
- Smart Card (Possession) + PIN (Knowledge)
- Password + Push notification + Face ID
✗ NOT True MFA
- Password + Security question (K + K)
- Password + Secret word (K + K)
- Fingerprint + Face scan (I + I)
- PIN + Password (K + K)
- Two different passwords (K + K)
Factor Comparison Matrix
| Factor Type | Revocable | Remote Theft | User Friction | Offline | Phishing Resistant | Scalable |
|---|---|---|---|---|---|---|
| Knowledge | ✓ | High | Low | ✓ | ✗ | ✓ |
| Possession (TOTP) | ✓ | Med | Med | ✓ | ⚠ | ✓ |
| Possession (FIDO2) | ✓ | Low | Low | ✓ | ✓ | Med |
| Inherence | ✗ | Low | Low | ✓ | ⚠ | Med |
| Location | ✓ | Med | Low | ✗ | ⚠ | ✓ |
Authentication Factor Sorter
Drag each authentication method to its correct factor category. You must place all chips before checking your answers.
DRAG FROM HERE:
Attack Scenario Simulator
Analyze four real-world attack scenarios. For each threat, review how different MFA mechanisms defend against it.
How It Works
Attacker obtains a breach database → extracts email/password pairs → runs automated login script against target → gains access to accounts where users reused passwords from the breached service.
Defense Effectiveness
How It Works
Attacker researches victim's carrier and personal info → calls carrier support impersonating victim → convinces rep to transfer number → receives all SMS OTPs for password resets and authentication.
Defense Effectiveness
How It Works
Victim clicks phishing link → arrives at convincing fake site (Evilginx2 proxy) → enters credentials and TOTP code → proxy relays everything to real site in <30 seconds → attacker logs in with stolen session token.
Defense Effectiveness
evil-bank.com cannot forge a valid signature for bank.com — the domain mismatch causes authentication to fail structurally.
How It Works
Attacker obtains username/password → sends 50+ push approval requests in rapid succession → victim approves one push to make the flood stop → attacker gains access. Uber breach (2022) used this technique combined with social engineering.
Defense Effectiveness
Key Terms
Essential vocabulary for MFA concepts, standards, and threat terminology.
Knowledge Check
Test your understanding of MFA concepts. Select the best answer for each question.