GenAuth DocsDocuments
Concepts
User Guide
Development Integration
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Concepts
User Guide
Development Integration
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Old version
Concepts
  • What is GenAuth
  • What is User Pool
  • What is Application
  • What is Authentication
  • What is Federation Authentication
  • What is Zero Trust Network
  • Single Sign-On and Single Sign-Out
  • What is Authorization
  • Authentication vs Authorization
  • What is JWT Token
  • What is ID Token
  • What is Access Token
  • What is Refresh Token
  • Access Token vs Id Token
  • Understanding OIDC and OAuth2.0 Protocol

  • Understanding SAML2 Protocol

  • What is Multi-Factor Authentication
  • Account Lifecycle Management
  • Hosted Login Page vs Embeddable Login Component
  • CIAM and EIAM
  • What is LDAP
  • How QR Code Login Works
  • Basic Concepts of Cryptography
  1. Concepts
  2. /
  3. What is Multi-Factor Authentication

¶ What is Multi-Factor Authentication

Update time: 2025-04-11 11:21:15
Edit

Multi-Factor Authentication (MFA) is a very simple security practice that can add an extra layer of protection beyond the username and password. After enabling multi-factor authentication, users need to provide a second authentication in addition to the username and password (first authentication) when performing operations. Multi-factor authentication combined will provide higher security protection for your account and resources.

For enterprises, the cost of data breaches is becoming more and more serious. On the one hand, enterprises will be punished by regulators, such as British Airways, which was fined 204 million euros by the UK Information Commissioner's Office (ICO) for data breaches. On the other hand, once a data breach occurs, the enterprise will lose the trust of customers and users, affecting the company's long-term development.

Therefore, the use of MFA has become a basic means for enterprises to prevent data breaches. MFA requires users to use at least two factors to verify their identity before they can access the application, which is rapidly becoming popular in enterprises.

Late last year, LastPass conducted a survey of 47,000 businesses and found that 57% of businesses worldwide are currently using MFA, up 12% from the previous year. Statistics also prove the effectiveness of MFA. Earlier this year, Microsoft reported that 99.9% of the breached accounts it tracked did not use multi-factor authentication.

¶ GenAuth Multi-Factor Authentication Core Functions

  • GenAuth ensures business security through multiple authentication methods.

  • Custom authentication process, one-click start, simple operation.

  • Support device environment data reporting, multi-dimensional analysis of security levels.

  • Support configuration policies to achieve environmental risk adaptation.

  • Also applicable to in-application permission control scenarios.

  • Default integration with Universal Login Component (Guard).

  • Manage user data, query behavior logs.

  • Provide SDK and open interface to help developers quickly call related capabilities and build customized user management pages.

¶ Multi-factor authentication method

GenAuth provides multiple authentication methods to improve enterprise identity security.

¶ Mobile token

Through highly secure dynamic OTP password verification, help protect account security and avoid malicious attacks.

¶ SMS/email verification code

  • Simple operation.

  • Convenient and fast.

  • Improve login security.

¶ Compatible with third-party authenticators

Compatible with third-party authenticators, including but not limited to:

  • Google Authenticator
  • Microsoft Authenticator

¶ Face recognition

As a key factor of human characteristics, face is widely used in the field of security authentication.

¶ Advantages of GenAuth multi-factor authentication

¶ Developer-friendly

Provide an out-of-the-box end SDK to facilitate end developers to quickly implement MFA.

  • Support multiple ends: Web, iOS, Android.
  • Built-in multiple MFA components, such as OTP, verification code, face recognition, etc.
  • Only one method needs to be called to invoke the MFA authentication component, get the authentication result, and complete the authentication process.

¶ Customized data reporting

Customized data reporting, participating in process initiation decision-making, covering more complex and refined scenarios.

  • Supports reporting data when the GenAuth SDK is initialized.
  • Supports scheduled data reporting.
  • Supports active data reporting when the application is running.

¶ Policy-based

MFA trigger conditions are based on custom policies, and the policy system is simple, efficient, complete, and flexible:

  • Simple: If you don't want to configure complex policies, you can use the default security policy or preset hit conditions.

  • Efficient: The policy hit is judged in milliseconds, and MFA is immediately invoked; based on a friendly user interface.

  • Complete: The policy is described based on function expressions, and developers can obtain enough information (including but not limited to user information, devices, networks, locations, behaviors, custom reported data, etc.) to write policy hit logic.

  • Flexible: Hit judgment can be made based on multiple methods at the same time.

¶ Simple configuration

Based on a friendly user interface, quickly configure MFA for specific applications:

  • One-click to turn on/off MFA.

  • One-click to enable the default security policy, without understanding the policy configuration, can also greatly improve the security of the application.

  • Preset more than a dozen important and commonly used policy hit conditions, which take effect immediately after selection, and can be used by non-engineers.

¶ Adaptive Multi-factor Authentication

Compared to traditional MFA, adaptive MFA can choose to apply different authentication methods according to the current security situation, ensuring security while also taking into account user experience. Adaptive MFA provides a more flexible and intelligent verification strategy.

When the user goes through the authentication process, "adaptive" MFA generates multiple key elements for the currently logged-in user:

  • User attributes: such as user name, password, user identity and other user attributes and information.

  • Location awareness: Location awareness is divided into virtual location (IP address) and physical location (country, region, etc.).

  • Request source: Determine the source of the current user's request, such as hardware device information, the system the user is currently in, etc.

  • Biometrics: Identify the user's biometric information, such as face recognition.

  • Behavior analysis: A series of user behaviors such as whether it comes from a common login location, whether the wrong password has been entered multiple times, and the user's previous operation records.

Previous article: SAML2 Flow Next article: Account Lifecycle Management
  • GenAuth Multi-Factor Authentication Core Functions
  • Multi-factor authentication method
  • Advantages of GenAuth multi-factor authentication
  • Adaptive Multi-factor Authentication

User identity management

Integrated third-party login
Customized authentication process

Enterprise internal management

Single sign-on
Multi-factor authentication
Permission management

Developer

Development Documentation
GitHub (opens new window)

Company

official@genauth.ai
16th Floor, Building B, Beichen Century Center, Chaoyang District, Beijing (Total)
Room 406, 4th Floor, Block B, No. 200, Tianfu Fifth Street, High-tech Zone, Chengdu (Branch)

© Beijing Steamory Technology Co., Ltd.