Multi-Factor Authentication (MFA) and Secure File Transfer

Share:

Are you who you say you are?

It sounds dramatic, but you’re asked this question hundreds of times a month by your company network, your phone, your bank, your email account and more. Authentication is the “assurance and confirmation of a user’s identity.”

3 Factors of Authentication

It’s always more secure to use two or multiple factors of authentication, known as multi-factor authentication or MFA, instead of one. For example, an ATM uses two-factor authentication, since it requires your debit card (something you have) and your PIN (something you know).

three factors of multi-factor authentication secure file transfer

The three factors of authentication are defined as something the user:

  • Knows – A password, PIN or an answer to a secret question.
  • Has – An access card or USB key.
  • Is – Facial features, eye structure or fingerprints.

In its guide to authentication, Okta adds an additional type called behavioral biometrics which is something the user does. To discuss the types of authentication, I’ve combined what a user is and what a user does into one biometrics category.

Type 1: Something the User Knows

Password

Password authentication uses the Password Authentication Protocol (PAP), which sends the username and password to the server to check its validity.

According to a study from NordPass, the average person has 100 passwords to remember. The sheer number of online accounts (for work and personal life) can tempt users to create guessable passwords, compromising security. It’s important for organizations to encourage users to create complex, long and unique passwords.

One-Time Password (OTP)

In one-time password (OTP) authentication, the user receives a unique password from a text message, application or email.

The time-based one-time password (TOTP) adds a time limit to the password, making it more secure.

CAPTCHA and reCAPTCHA

CAPTCHA stands for the Completely Automated Public Turing test to tell Computers and Humans Apart. Created in 2000, its purpose is to distinguish human website visitors from bots by giving a task that people can pass easily but bots cannot.

reCAPTCHA has a “risk analysis engine” that can predict whether a user is human or not. If it can’t decide, it prompts a CAPTCHA.

Single Sign-On (SSO)

With single sign-on (SSO), users use one password to authenticate with and access multiple applications and websites. To use SSO, organizations choose an identity provider, which exchanges a certificate with the application or website to authenticate.

SSO has strong advantages and disadvantages. By only using one password, employees can focus more on their work and avoid constantly resetting passwords. However, if employees use weak passwords, a hacker can access multiple systems quickly.

Type 2: Something the User Has

Certificate

To access resources from servers, a client receives a physical or electronic certificate from the network’s security server. Any other server in the network can validate the certificate and establish the connection.

Security Token

Security tokens are like certificates, but they include information about what the user can access. A token can be a physical device (such as a USB key or other device to plug into a laptop) or a piece of data that has no meaning or use on its own, but combined with the correct tokenization system, becomes a vital entity in securing an application.

Public Key and Private Key

Public key authentication includes two types of keys: one public and one private. Anyone can see the public key, but the private key is secret. The private key generates a signature that can’t be created by anyone who doesn’t have it. The public key is used to verify the signature’s authenticity.

Public key authentication is preferred over password authentication because signatures can’t be reused. Hackers who find used signatures can’t access the server.

Type 3: Something the User Is or Does

Physical Biometrics

Physical biometrics include facial features, eye structure, fingers (especially fingerprints), hand shape and more. Because physical biometrics are inseparable from the user, they provide more certainty and less risk than other types of authentication.

Behavioral Biometrics

Behavioral biometrics track a user’s unique actions – their typing speed or force of pressing keys, for example – to verify identity. To implement behavioral biometrics, devices record how a user typically behaves and compare it to the user’s actions throughout the session.

The Future of Authentication

Some experts are interested in replacing passwords with biometrics for authentication. Microsoft and Apple are taking steps toward a passwordless future, but it may take years before passwords are fully replaced.

Regardless of which type of authentication is preferred in the future, its importance will only grow as data security becomes a bigger concern. As a managed file transfer (MFT) company, the security of our customers’ data is crucial.

Thru currently supports the following types of authentication:

  • Multi-factor
  • Single sign-on (SSO)
  • Password
  • Key
  • Certificates

Learn more about our secure file transfer and compliance stance »

secure file transfer login screen on monitor surrounded around fingerprint key certificates lock

 

Share:

Have questions about managed file transfer?

Get answers, not a sales pitch. Our experts have analyzed, discussed and solved difficult file transfer challenges since 2002. We are here to help you.

Scroll to Top