Skip to main content
This content has been archived and is no longer being updated. Links may not function; however, this content may be relevant to outdated versions of the product.
LinkedIn
Copied!

Authentication using two factors

This presentation is part of the Authentication Overview Self-Study Course.

Transcript

Two-factor authentication overcomes the weakness of passwords.  There are three universally recognized factors for authenticating individuals:

  1. 'Something you know', such as a secret password or PIN
  2. 'Something you have', such as a mobile phone, credit card or hardware security token
  3. 'Something you are', such as a fingerprint, a retinal scan, or other biometric characteristic

Two-factor authentication requires at least two of the authentication form factors mentioned above (typically the first two).  This makes it much more secure than traditional password authentication, which requires only one authentication factor (such as knowledge of a password) in order to gain access to a system.

Deployment of two-factor authentication devices, such as smart cards and hardware tokens, appears to be increasing.  More and more organizations are adding a layer of security to the desktop that requires users to physically possess a token, plus have knowledge of a PIN or password in order to access company data.

Suggest Edit
Did you find this content helpful?

0% found this useful

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Ready to crush complexity?

Experience the benefits of Pega Community when you log in.

We'd prefer it if you saw us at our best.

Pega Community has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice
Contact us