Multi-factor authentication (MFA) is a security process that requires users to verify their identity using two or more independent credentials before gaining access to an account, application, or system. These credentials are drawn from at least two of the following categories: something you know (a password or PIN), something you have (a smartphone or hardware token), and something you are (a fingerprint or face scan). By combining multiple factors, MFA ensures that even if one credential is compromised, for example, through a phishing attack or data breach, unauthorized access is still prevented. MFA is a foundational control in modern cybersecurity and is mandated by regulations such as PSD2, NIS2, and DORA.
Learn more about MFA.
Multi-factor authentication works by adding one or more verification steps on top of a standard username and password login. Here is how a typical MFA flow works:
- The user enters their username and password (first factor: something they know).
- The system prompts for a second verification step, such as a one-time password (OTP) sent via SMS, a push notification sent to a registered mobile device, or a biometric scan.
- Only after both factors are successfully verified does the system grant access.
Some advanced MFA implementations use risk-based logic to skip the second step for low-risk logins (e.g., a known device on a corporate network) and only escalate to a stronger factor when unusual activity is detected. This is known as adaptive or step-up authentication.
Learn more about MFA.
Authentication factors are the independent categories of evidence used to verify indentity. There are three main factors:
Something you know - passwords, PINs, security questions
Something you have - mobile devices, hardware tokens, smart cards
Something you are - biometrics such as fingerprints and facial recognition
True MFA requires at least two factors from different categories. Using two passwords, for example, counts as a single factor authentication because both belong to the same category.
Learn more about MFA.
There are several types of multi-factor authentication, each using a different combination of verification factors:
- OTP (One-Time Password): A time-limited code sent via SMS, email, or generated by an authenticator app.
- Push Authentication: A push notification sent to the user's mobile device asking them to approve or deny the login.
- Biometric Authentication: Verification using a fingerprint, face scan, iris pattern, or voice recognition.
- Hardware Tokens: A physical device (e.g., a USB security key or smart card) that generates or stores authentication credentials.
- FIDO2 / Passkeys: A phishing-resistant, passwordless standard using public-key cryptography and device-bound authenticators.
- QR Code Authentication: A QR code displayed on one device is scanned by a trusted mobile device to confirm identity.
- Out-of-Band (OOB) Authentication: Verification through a completely separate communication channel, such as a phone call or separate app.
- Certificate-based authentication: Digital certificates that are tied to a user's identity.
The most appropriate MFA type depends on the security requirements, user experience goals, and regulatory context of the organization.
Learn more about MFA.
2FA (Two-Factor Authentication) and MFA (Multi-Factor Authentication) are closely related but not identical. 2FA is a specific subset of MFA that requires exactly two authentication factors, no more, no less. MFA is the broader category that requires two or more factors, meaning it can include three or even four verification steps for higher-security environments. In practice, most consumer-facing implementations use 2FA (e.g., password + OTP), while enterprise and high-assurance environments may deploy true multi-factor flows combining password, hardware token, and biometric verification. Both 2FA and MFA are significantly more secure than single-factor authentication (SFA), which relies on a password alone.
Lear more about MFA vs. 2FA.
Common, real-world examples of MFA include:
Passkey login on a banking app - a customer authenticates using a device-bounde passkey verified by Face ID or fingerprint, with no password involved at any point.
Transaction signing for high-value payments - a corporate banking user initiates a wire transfer and must approve it via a push notification that displays the exact amount and recipient, dynamically linking the authentication to the transaction (as required under the PSD2 SCA).
Workfoce access in a Zero Trust environment - an employee accessing a cloud-based core banking system is continuously verified based on device health, location, and behavior, with step-up MFA triggered for privileged actions.
Customer re-authentication at transaction tresholds - a retail banking customr browsing their account proceeds with minimal friction, but adding a new payee or exceeding a transation limit triggers biometric re-verification via the bank's mobile app.
Learn more about MFA.
MFA is one of the most effective security controls available because it eliminates the most common attack vector: compromised passwords. According to industry research, over 80% of data breaches involve stolen or weak credentials. MFA ensures that even if an attacker obtains a user's password through phishing, brute force, or a data breach, they still cannot access the account without the second factor, which they are unlikely to possess. Beyond preventing unauthorized access, MFA is a compliance requirement under major regulations including PSD2 (Strong Customer Authentication), NIS2, DORA, and GDPR-aligned security frameworks. For organizations, deploying MFA significantly reduces the risk of account takeover fraud, data breaches, and the financial and reputational damage that follows.
Learn more about MFA.
A one-time password (OTP) is a dynamically generated, single-use authentication code that is valid for only one login session or transaction, typically for 30 to 60 seconds. Unlike a static password, an OTP cannot be reused, making it significantly more resistant to replay attacks and credential theft. OTPs are delivered through several channels: via SMS or email (sent to a registered number or address), through an authenticator app (TOTP - Time-based One-Time Password), or displayed on a hardware token. OTPs are widely used as the second factor in MFA implementations for online banking, enterprise applications, and payment authentication.
SMS OTP is a method of delivering a one-time password to a user's registered mobile number via text message. When a user initiates authentication, the system generates a short lived numeric code and sends it to the user's phone. The user enters the code to complete verification. While SMS OTP is widely used and easy to deploy, it carries a higher risk profile than app-based or hardware OTP methods due to vulnerabilities such as SIM swapping and SS7 protocol attacks. For high-risk use cases, such as large financial transactions or privileged system access, stronger alternatives are recommended.
Biometric authentication is the process of verifying a user's identity based on unique physiological or behavioral characteristics. Common biometric modalities include fingerprint scanning, facial recognition, iris scanning, voice recognition, and behavioral patterns such as typing rhythm. Biometrics fall under the 'something you are' authentication factor and are increasingly used as a primary or second factor in MFA. They offer a strong combination of security and user convenience, users do not need to remember a password or carry a token. Biometric data is typically stored as an encrypted mathematical template (not a raw image) and compared locally on the device or against a secure server-side template during verification.
Learn more about biometric authentication.
Push authentication is an MFA method in which the authentication system sends a real-time push notification to the user's registered and trusted mobile device, prompting them to approve or deny the login or transaction with a single tap. The user does not need to manually enter a code, making it faster and more convenient than OTP-based methods while maintaining strong security. Push authentication is inherently out-of-band, the primary session occurs on one channel (e.g., a browser) while verification happens on a separate channel (the mobile device). This separation significantly reduces the risk of man-in-the-middle attacks. Push authentication is widely used in mobile banking apps and enterprise identity solutions.
Passwordless authentication is a method of verifying user identity without requiring a traditional password. Instead of a password, authentication relies on stronger and more user-friendly factors such as biometrics (fingerprint or face recognition), hardware security keys (e.g., FIDO2-compatible devices), magic links sent to a verified email address, or device-based authenticators. Passwordless authentication eliminates the most significant weakness in traditional authentication, the password itself, making it resistant to phishing, credential stuffing, and brute-force attacks. It also simplifies the user experience by removing the need to remember and manage complex passwords. Passwordless is increasingly adopted in banking, enterprise, and consumer applications as organizations look to balance security and usability.
Learn more about passwordless authentication.
Strong authentication refers to identity verification methods that go beyond a single static password and provide a significantly higher level of assurance that the user is who they claim to be. In regulatory terms, particularly under PSD2, strong authentication is defined as Strong Customer Authentication (SCA): a process that uses at least two independent factors from the categories of knowledge (password or PIN), possession (device or token), and inherence (biometrics). Strong authentication is resistant to the most common attack vectors including phishing, credential stuffing, man-in-the-middle attacks, and brute force. It is the authentication standard required for online payments in Europe and is increasingly mandated across industries.
Learn more about SCA.
Adaptive authentication is a dynamic security approach that continuously evaluates the risk of each login or transaction attempt in real time and adjusts the level of authentication required accordingly. Rather than applying the same verification step for every access event, adaptive authentication analyzes contextual signals, such as the user's device, IP address, geolocation, time of day, and behavioral patterns, to calculate a risk score. Low-risk logins (e.g., a known device, regular location, normal behavior) proceed with minimal friction. High-risk signals (e.g., a new device, unusual location, or large transaction) trigger step-up authentication, requiring the user to provide an additional factor such as biometrics or OTP. Adaptive authentication is also known as risk-based authentication (RBA) and is a core component of modern IAM and 3D Secure 2 implementations.
Risk-based authentication (RBA) is an authentication strategy that dynamically determines the appropriate level of identity verification required for each access attempt, based on a real-time assessment of the associated risk. Key risk signals evaluated include device fingerprint, IP address and geolocation, time and frequency of access, transaction amount, and deviations from established user behavior patterns. When risk is low, for example, a user logging in from their usual device and location, authentication proceeds with minimal friction. When risk is elevated, such as an unfamiliar device, unusual location, or a high-value transaction, the system escalates to a stronger authentication challenge. RBA is a foundational mechanism in fraud prevention platforms and is mandated within the 3D Secure 2 protocol for online payment authentication in Europe.
Learn more about risk-based authentication.
Step-up authentication is a security mechanism in which a user who has already authenticated at a base level, typically with a username and password, is asked to complete an additional verification step before accessing a higher-risk resource or performing a sensitive action. For example, a user logged into their banking app may be prompted for a biometric scan or OTP when initiating a large transfer or changing account settings. Step-up authentication applies the principle of proportional security: everyday actions require minimal friction, while high-stakes actions trigger stronger verification. It is a practical implementation of risk-based and adaptive authentication and is widely used in banking, healthcare, and enterprise security environments.
FIDO2 is an open authentication standard developed by the FIDO Alliance and the World Wide Web Consortium (W3C) that enables phishing-resistant, passwordless authentication using public-key cryptography. It consists of two specifications: WebAuthn (Web Authentication API), which defines how browsers and applications interact with authenticators, and CTAP (Client to Authenticator Protocol), which governs communication between the client device and an external authenticator such as a USB security key. During FIDO2 authentication, a unique cryptographic key pair is created per service, the private key stays on the user's device and never leaves it, while the public key is registered with the service. Login is verified by a cryptographic signature, meaning there are no passwords to steal, phish, or breach. FIDO2 supports device biometrics (e.g., fingerprint, Face ID), hardware tokens (e.g., YubiKey), and platform authenticators (e.g., ASEE Authenticator).
Learn more about FIDO2.
Challenge/Response (C/R) authentication is a security protocol in which the authenticating system presents the user or device with a unique challenge, typically a random value, token, or encrypted string, and the user must return the correct response derived from a shared secret or private cryptographic key. Because each challenge is unique and time-bound, C/R authentication is inherently resistant to replay attacks: intercepting a past response provides no advantage to an attacker because it will not be accepted for a different challenge. Challenge/response mechanisms underpin many authentication protocols including FIDO2, hardware OTP tokens, and cryptographic mutual authentication in secure communications.
QR code authentication is a login or transaction verification method in which a unique, time-limited QR code is displayed on one device, typically a browser on a desktop or laptop, and scanned by the user's registered and trusted mobile device to confirm their identity. The mobile device acts as a second authentication factor, combining possession (the trusted, registered device) with optional biometric verification (unlocking the phone with a fingerprint or face scan). QR code authentication is phishing-resistant because it does not involve entering credentials that could be intercepted, and it provides a seamless, low-friction user experience for cross-device scenarios such as logging into a corporate portal from a shared workstation.
The Cyber Resilience Act (CRA) is a European Union regulation that establishes mandatory cybersecurity requirements for all products with digital elements sold in the EU market, including hardware, software, and connected devices. Proposed by the European Commission in September 2022 and entering into force in December 2024, the CRA is the first EU-wide legislation to require that cybersecurity is built into digital products from the design stage, not added as an afterthought.
Under the CRA, manufacturers, importers, and distributors of products with digital elements are required to:
- ensure products are designed and developed with security by default and security by design principles;
- eliminate known vulnerabilities before a product is placed on the market;
- provide security updates throughout the product's expected lifetime;
- disclose actively exploited vulnerabilities to ENISA (the EU Agency for Cybersecurity) and national authorities - - within 24 hours of discovery;
- and maintain a Software Bill of Materials (SBOM) documenting all software components.
The CRA applies to a broad range of products, from consumer IoT devices such as smart home appliances and wearables, to enterprise software, network equipment, and critical infrastructure components.
Products are classified into three risk categories:
- default (most products);
- important (Class I and II: products such as identity management software, firewalls, and browsers);
- critical (subject to the strictest requirements).
Manufacturers of important and critical products must undergo third-party conformity assessments before affixing the CE marking required to sell in the EU. Non-compliance can result in fines of up to €15 million or 2.5% of global annual turnover, whichever is higher. Most CRA requirements become applicable in December 2027, giving organizations a transition window to align their products and processes.
The Cyber Resilience Act (CRA) does not mandate multi-factor authneitcation (MFA) by name, but its essential cybersecurity requirement effectivelly require it in practice. The CRA obliges manufacturers and developers of products with digital elemnts sold in the EU to implement strong access control mechanisms proportional to the risk, including the prohibition of default or easily guessable credentials and the requirement to protect against unauthorized access. For any product handling sensitive data or performing security-critical functions, MFA is the standard mechanism that satisfies these obligations. Organizations seeking CRA compliance should therefore treat MFA as a baseline security control, not an optional enhancement.


