When you log into a website/application with a username and password, you are asked to enter a phone number. You receive a code on your phone. Entring this will validate you. This is multifactor authentication (Two factors)
Another option is, you are asked to enter an email. The code received in the email is inserted. There you go-This is multifactor Authentication.
Type of Authentications
There are different type of authentication techniques:
2.two-factor authentication [2FA]
8. single sign-on [SSO])
9.specific authentication protocols (including Kerberos and SSL/TLS
10.Three-factor authentication (3FA)
11.Four-factor authentication (4FA)
Multi-Factor Authentication (MFA) is a security system that verifies a user’s identity by requiring multiple credentials. It is a critical component of identity and access management (IAM). Rather than just asking for a username and password, MFA requires other—additional—credentials, such as a code from the user’s smartphone, the answer to a security question, a fingerprint, or facial recognition.
Multi-factor authentication (MFA) is a method of logon verification where at least two different factors of proof are required. MFA is also referred to as 2FA, which stands for two-factor authentication. MFA helps keep protect your data (email, financial accounts, health records, etc.) or assets by adding an extra layer of security.
Multifactor authentication (MFA) adds an extra layer of security to your account by requiring all users to authenticate by using an additional authentication method beyond an ID and password
3 Types of multi-factor authentication
There are a number of different checks you can use to implement MFA. By combining two or three factors from the following three categories, multi-factor authentication can be created. Multi-factor authentication is preferred, as it is much more difficult for a hacker.
1.Something You Know-This includes passwords, PINs, combinations, code words, etc.Example: SMS, Email,
2.Something You Have-This includes physical objects, such as keys, smartphones, smart cards, and token devices. (A token device produces a time-based PIN).Example: a mobile device for access along with USB, Google Authenticator
3. Something You Are-This includes fingerprints, palm scanning, facial recognition, retina scans, and voice verification. Example: Biometric verification