- Official Post
In IT there are so many authentication options. Here are the 10 commonly used ones.
Authentication | Description |
|---|---|
Password-Based | Users enter a username and password. |
Two-Factor (2FA) | Combines a password with a second factor like a mobile code or app. |
Multi-Factor (MFA) | USes multiple factors, such as a password, a smartphone and biometrics. |
Biometric | Uses unique biological characteristics like fingerprints, facial recognition or iris scans. |
Token-Based | Users posess a physical device (token) that generates a code. |
Certificate-Based | Digital certificates authenticate users - often used in enterprise environments. |
Single Sign-On (SSC) | Allows users to log in once and gain access to multiple systems without re-authenticating |
Smart Card | Users authenticate by inserting a smart card into a reader and entering a PIN. |
OAuth/OpenID Connect | USers authenticate via third party services (like Facebook or Google) to access different services. |
Behavioral | Analyzes patterns un user behaviour (like typing speed, mouse mouvements and so on) to authenticate users. |