The most secure multi-factor authentication methods (2024)

Before we start, MFA with any method is better than no MFA at all. Although some methods are better than others, they're all leagues ahead of passwords alone. If, for whatever reason, you can only implement MFA using a weaker second factor, you should still do it. You can always improve later and you'll have made a significant improvement even with the weaker second factor.

So, how can one factor be better than others? Here's how we think about it:

  • User experience: how easy is it to use?

  • Security: how easy is it for someone to compromise?

  • Cost: do you need to upgrade your SaaS license, or buy physical bits?

  • Support: how widely can it be used?

Just want the answers?

  • Using an app on your phone, like Microsoft or Google Authenticator, to receive notifications or use a one-time password are the top all-round options today - they're free, intuitive for users, relatively easy to set up, and widely supported.

  • The gold standard is a FIDO2-capable security key, like the YubiKey 5 series, or a security key built-in to your device, like Touch ID - it's the most secure, provides the best user experience, but has an upfront cost as each user will need a key or a compatible device. The main drawback today is they aren't supported on all platforms yet so might not be an option everywhere.

  • Factors that rely on your phone number, such as SMS and phone calls should be avoided if possible as they are the least secure and provide the worst user experience.

Here's a summary:

Method

User experience

Security

Cost

Support

App Notification

Good

Good

Free

Widely supported

App code

Moderate

Good

Free

Widely supported

Security key (external)

Best

Best

Expensive

Some platforms

Security key (internal)

Best

Best

Free

Some platforms

SMS

Poor

Poor

Cheap

Widely supported

Phone call

Poor

Poor

Cheap

Widely supported

Want to find out which MFA methods are used by your organisation?

Use our platform to quickly check out which MFA methods your users have registered. Follow our detailed guidance and use our automations to speed through any future MFA deployments or improvements with ease.

Learn more

App Notification

One of the most common methods today is the app notification. Using an app on your phone, like Microsoft Authenticator, to receive a push notification when you login.

Free, easy to use, and secure - this is a good choice if your users all have devices to install the app on and will reliably have a network connection to receive the notification.

Your challenges with using this method will be getting the app setup on everyone's device, getting everyone enrolled, and making sure users understand to only hit approve when they actually performed a login (seriously).

Hint: where available, and where they are the sole user of the device, allow users to have platforms "remember their device", so they only get prompted once a month or similar.

Reducing the volume of MFA prompts will greatly reduce the chance of a user accepting prompts they didn't initiate.

App Code

The early days of MFA looked like RSA tokens; those devices you used to have to carry on a key chain with a code that changed every minute. Those devices worked by having a "seed" value that both the device and the server knew which changed predictably. So long as that seed value stayed safe, this provided a convenient second factor for users that was difficult to compromise.

Today, this approach is more common via an app, where the app provides a code that changes every minute, but the concept is exactly the same.

This approach uses what is officially called One Time Passwords (OTP) but is often just referred to as an app code. It has some advantages, such as not needing signal after setup which can be handy if that's a concern.

However, as was true of the RSA tokens of the past, if the seed value is compromised all future values can be predicted. The odds of this happening in practice are exceptionally low so this remains a good choice.

Your challenges with using this method will again be mostly in rolling it out to all users and getting everyone setup.

Text message / phone call

As MFA gained popularity, receiving a code via text message (SMS), or sometimes a phone call, quickly became the de-facto method. Before everyone had smartphones and therefore the ability to install apps, using text messages or phone calls was the only way to implement MFA without having to provision RSA tokens for everyone in the team.

The major downside to using these methods is their reliance on the security of the phone number. If attackers really want to target an account, and they know the phone number used for MFA, they can try something called SIM-swapping to hijack the phone number, and hence nullify the MFA.

The most important thing to note in that scenario is how targeted it is. With no MFA, any attacker on the Internet can simply guess passwords on an account - the cost is extremely low. To bypass SMS or phone call MFA using SIM swapping has a significantly higher cost. The attack is definitely practical, but would only happen when you're specifically targeted.

Additionally, the user experience isn't as good. Firstly, the user must have mobile signal to receive the SMS or call. Secondly, there can often be a delay in delivery, due to the less-reliable mobile network. Finally, there is almost always a usage cost associated with these methods, since it costs money to send SMSs or make phone calls.

Because of this, SMS or phone calls are often considered least desirable MFA methods today.

Security keys

FIDO2 is the name for a set of authentication protocols and standards developed by a consortium of tech companies to be the future of authentication. FIDO2 solves a lot of the problems we've dealt with in the past: it's secure, usable, impossible to spoof.

Without digging into the weeds of how that works (the official page from the FIDO alliance is worth a read if you're interested), you will need what's commonly referred to as a "security key" to make use of it. This is a small physical device, often plugged into your USB port - modern devices that understand FIDO2, like the YubiKey 5 Series, are preferable. Once setup, you simply touch the key on login and the magic of cryptography ensures a high degree of security.

In fact, this approach is so secure, it is the basis of a "passwordless" revolution, where this strong factor of authentication can feasibly be used as a single-factor of authentication, and users don't even need to remember passwords anymore. Though in its infancy at the moment, expect to hear more about that in the coming years.

The primary drawback of this method is the cost, with devices typically costing around $50 each. Also, although you can expect them to be supported on major platforms, they aren't supported as widely as other methods just yet.

If you are unable to justify their cost for all users, a common implementation is to use security keys for high privilege accounts.

Built-in security keys

Many modern mobile devices like laptops, tablets and phones have built-in security keys (e.g. Apple TouchId, Android phones, and Windows Hello). These have many of the advantages of stand-alone security keys, but without the cost!

Support for these keys is a fairly recent development and is still ongoing but opens up an exciting future where users will increasingly be able to very easily add a second factor, or even go passwordless, in a secure way, without much effort or thought.

In conclusion there are multiple options you can choose from to fit almost any scenario you have. While some options are better than others, even the worst option is still a massive improvement on passwords alone. In the end, the best MFA method is the one you can start rolling out today, you can always improve down the line.

See more original research and technical content from Push

The most secure multi-factor authentication methods (2024)

FAQs

What is the safest 2FA method? ›

Hardware security keys like YubiKey provide the most secure form of two-factor authentication. Unlike SMS or authenticator apps which can be phished, hardware keys offer phishing resistant authentication by requiring physical possession of the key.

What is the strongest MFA? ›

PKI Certificate-Based Authentication (CBA)

In conclusion, clear winners in the strength hierarchy of MFA forms are the phishing-resistant hardware-based authenticators—FIDO2-compliant devices and PKI Certificate-Based Authentication.

What is the most secure authentication mode? ›

The WPA Wi-Fi protocol is more secure than WEP, because it uses a 256-bit key for encryption, which is a major upgrade from the 64-bit and 128-bit keys used by the WEP system. WPA also uses the Temporal Key Integrity Protocol (TKIP), which dynamically generates a new key for each packet, or unit of data.

Which of the three factors of authentication is most secure? ›

3FA access might require a system login that requires a PIN, OTP and fingerprint scan. Although 3FA is generally considered more secure, if poorly implemented, a system that uses 2FA could be more secure -- as two stronger, well-implemented factors are more secure than three weak authentication factors.

What is the safest multi-factor authentication? ›

Most Secure: Hardware Keys

Also called FIDO keys, they generate a cryptographically secure MFA authentication code at the push of a button. FIDO keys differ from OTP hardware because they send codes directly to the device via a USB port or NFC connection.

Which authentication method is the most secure? ›

1. Biometric Authentication Methods. Biometric authentication relies on the unique biological traits of a user in order to verify their identity. This makes biometrics one of the most secure authentication methods as of today.

What is more secure than 2FA? ›

Multi-factor authentication (MFA) is more secure than two-factor authentication (2FA) These two terms are often used interchangeably, but they're not quite the same thing.

What is the most secure authenticator? ›

We would recommend Google Authenticator to anyone interested in a strong, no-frills free authenticator app that is available for both iOS and Android.

What is the least secure authentication method? ›

While common, PAP is the least secure protocol for validating users, due mostly to its lack of encryption. It is essentially a routine log in process that requires a username and password combination to access a given system, which validates the provided credentials.

Which form of authentication is the strongest? ›

A physical authentication key is one of the strongest ways to implement multifactor authentication. A private key, stored on a physical device, is used to authenticate a user, such as a USB device that a user plugs into their computer while logging in.

What is the most secure way to allow authentication? ›

Biometric authentication uses unique physical characteristics, such as fingerprint or facial recognition for identification. This type of authentication is highly secure and convenient (no one forgets their fingerprint), though it requires specialized hardware that can be costly to install and integrate.

What is the strongest authorization mechanism? ›

Inherence is considered the strongest authentication factor because it asks users to confirm their identity by presenting evidence inherent to unique features. Common inherence factor examples include biometrics like fingerprint scans, retina pattern scans, and facial recognition.

Why is 2FA no longer safe? ›

Even if the user doesn't respond to a push login request or doesn't enter a One-Time Password (OTP) when prompted, a hacker still knows they have a working password now; how, because the delay for the denied message takes longer... Most of us know where this is going; the hacker is persistent in their login attempts.

What is the strongest form of two-factor authentication? ›

FIDO U2F is the most secure form of 2FA that prevents against password cracking, man-in-the-middle, and phishing attacks. Learn more about FIDO U2F here.

Can hackers get through 2FA? ›

Most 2FA methods involve sending temporary codes via SMS or emails, but these can be easily intercepted by hackers through account takeover, SIM swapping, and/or MitM attacks.

Top Articles
How to Listen to Subliminals Correctly
Exclusion Clauses Lecture
9.4: Resonance Lewis Structures
123 Movies Black Adam
Kansas City Kansas Public Schools Educational Audiology Externship in Kansas City, KS for KCK public Schools
La connexion à Mon Compte
Self-guided tour (for students) – Teaching & Learning Support
Cvs Devoted Catalog
U.S. Nuclear Weapons Complex: Y-12 and Oak Ridge National Laboratory…
Red Heeler Dog Breed Info, Pictures, Facts, Puppy Price & FAQs
Ukraine-Russia war: Latest updates
Methodist Laborworkx
7440 Dean Martin Dr Suite 204 Directions
Lima Funeral Home Bristol Ri Obituaries
Mary Kay Lipstick Conversion Chart PDF Form - FormsPal
Craigslist Edmond Oklahoma
6813472639
Xomissmandi
WEB.DE Apps zum mailen auf dem SmartPhone, für Ihren Browser und Computer.
Nine Perfect Strangers (Miniserie, 2021)
Forum Phun Extra
20 Different Cat Sounds and What They Mean
Cvs El Salido
Poe Str Stacking
LCS Saturday: Both Phillies and Astros one game from World Series
Filthy Rich Boys (Rich Boys Of Burberry Prep #1) - C.M. Stunich [PDF] | Online Book Share
Myql Loan Login
At 25 Years, Understanding The Longevity Of Craigslist
Victory for Belron® company Carglass® Germany and ATU as European Court of Justice defends a fair and level playing field in the automotive aftermarket
The Banshees Of Inisherin Showtimes Near Broadway Metro
Masterbuilt Gravity Fan Not Working
Pioneer Library Overdrive
Christmas Days Away
Issue Monday, September 23, 2024
Club Keno Drawings
Craigslist Cars And Trucks Mcallen
Powerball lottery winning numbers for Saturday, September 7. $112 million jackpot
Google Jobs Denver
Obsidian Guard's Skullsplitter
R&J Travel And Tours Calendar
House Of Budz Michigan
Wsbtv Fish And Game Report
Regis Sectional Havertys
How To Paint Dinos In Ark
Vision Source: Premier Network of Independent Optometrists
Google Flights Orlando
Cygenoth
Vocabulary Workshop Level B Unit 13 Choosing The Right Word
2024-09-13 | Iveda Solutions, Inc. Announces Reverse Stock Split to be Effective September 17, 2024; Publicly Traded Warrant Adjustment | NDAQ:IVDA | Press Release
Pathfinder Wrath Of The Righteous Tiefling Traitor
✨ Flysheet for Alpha Wall Tent, Guy Ropes, D-Ring, Metal Runner & Stakes Included for Hunting, Family Camping & Outdoor Activities (12'x14', PE) — 🛍️ The Retail Market
Ty Glass Sentenced
Latest Posts
Article information

Author: Reed Wilderman

Last Updated:

Views: 5481

Rating: 4.1 / 5 (52 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Reed Wilderman

Birthday: 1992-06-14

Address: 998 Estell Village, Lake Oscarberg, SD 48713-6877

Phone: +21813267449721

Job: Technology Engineer

Hobby: Swimming, Do it yourself, Beekeeping, Lapidary, Cosplaying, Hiking, Graffiti

Introduction: My name is Reed Wilderman, I am a faithful, bright, lucky, adventurous, lively, rich, vast person who loves writing and wants to share my knowledge and understanding with you.