You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Multi-factor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction. Requiring the use of MFA for internet accessible endpoints is encouraged because by requiring not only something the user knows (a knowledge factor like a memorized password) but also something that the user has (a possession factor like a smartcard, yubikey or mobile phone) the field of threat actors that could compromise the account is reduced to actors with physical access to the user.
In cases where the possession factor is digital (a secret stored in your mobile phone) instead of physical (a smartcard or yubikey), the effect of MFA is not to reduce the field of threat actors to only those that have physical access to the user, because a secret can be remotely copied off of a compromised mobile phone. Instead, in this case, the possession factor merely makes it more difficult for the threat actor since they now need to brute force/guess your password and compromise your mobile phone. This is, however, still possible to do entirely from a remote location. In particular, storing both first on second factor on the same device (for example: mobile phone) is strongly discouraged.
There are actually two major rationales for MFA:
Resistance to password-based replay attack (either because of phishing or password cracking)
Resistance to compromise of the user's device
The first of these is obtained because the second factor is not replayable. The second of these is obtained not when the secret is physical but rather when it is not software accessible. For instance, WebAuthn using a secret stored in trusted hardware on the device (as I believe is the case with TouchID/FaceID on new Safari) resists remote compromise even though it is on the same device as the users password. However, even the first of these is quite valuable, given the relative prevalence of phishing and remote compromise.
The text was updated successfully, but these errors were encountered:
The current MFA text reads:
There are actually two major rationales for MFA:
The first of these is obtained because the second factor is not replayable. The second of these is obtained not when the secret is physical but rather when it is not software accessible. For instance, WebAuthn using a secret stored in trusted hardware on the device (as I believe is the case with TouchID/FaceID on new Safari) resists remote compromise even though it is on the same device as the users password. However, even the first of these is quite valuable, given the relative prevalence of phishing and remote compromise.
The text was updated successfully, but these errors were encountered: