Top 10 identity and access management risks What is two-factor authentication (2FA)?

What are the most common digital authentication methods?

How an organization authenticates users and devices is a hugely important piece in the cybersecurity puzzle. Get to know the various forms of digital authentication.

Digital authentication is the process of verifying that users or devices are who or what they claim to be in order to enable access to sensitive applications, data and services. There are multiple ways to verify authenticity. Here's an outline of the most popular digital authentication methods in the enterprise today.

Unique passwords

When most of us think of authentication, what typically comes to mind is a unique combination of username and password. In the enterprise, passwords remain the most common digital authentication method. Users or devices typically have their own username that is not secret. This username is combined with a unique and secret password known only by the users or devices to access company data, applications and services. While the unique password authentication method works, the number of passwords users must manage can make this approach burdensome. This is one reason why technologies such as single sign-on (SSO) have become so popular. With SSO, a single password will authenticate users and enable access to multiple assigned corporate services.

Biometric authentication

It has become common for devices such as smartphones, tablets and PCs to incorporate biometric technologies into their hardware for digital authentication purposes. Fingerprints and facial recognition are used most often; other biometric methods include hand geometry, retina and iris scans, voice recognition and signature-based analysis. While popular, biometrics raises privacy and security concerns that a business will need to work through. It's important to know both the pros and cons of biometric authentication.

Chart of 16 icons in a grid representing various types of biometric authentication.

Multifactor authentication (MFA)

With multifactor authentication, users verify their identity using two or more methods. A commonly used form of MFA is two-factor authentication (2FA), which takes the standard process of requesting a username and password and applies a second layer of verification. This second layer in 2FA might include a text message sent to a specific mobile phone number, the use of hardware and software tokens, biometric authentication or push notifications to the user.

Adaptive authentication

This approach, which is related to risk-based authentication, enables a security team to set authentication policies to grant or deny access based on a long list of factors, including IP address, user role, location, device, sensitivity of the data being accessed and other risk factors. These context-based elements of adaptive authentication are the basis of the zero-trust model. With a zero-trust strategy, an organization sets its user and device authentication to strict minimums so that, as the name indicates, identity and access management systems trust no one by default. This rejection of the implicit trust concept requires a rigorous, almost continuous authentication -- in contrast to a one-time check at the security perimeter.

Illustration of how zero-trust security compares to perimeter-based security.

Behavioral authentication

Behavioral biometric authentication can involve analyzing keystroke dynamics or mouse-use characteristics. To verify a user or machine, AI analyzes user data or a device's typical computing behavior. If that behavior veers outside predefined baselines, it triggers a lockdown of what that user or device is authorized to access.

Device recognition

Endpoint security management platforms can recognize authorized hardware and immediately enable their access to certain network resources. This type of authentication is especially important for companies that allow users to access business applications on personal devices. It is an added precaution to ensure that only devices deemed appropriate can connect to the network.

Editor's note: This article was originally published in 2020 and has been updated to add new information on authentication technology.

Andrew Froehlich is founder of InfraMomentum, an enterprise IT research and analyst firm, and president of West Gate Networks, an IT consulting company. He has been involved in enterprise IT for more than 20 years.

Next Steps

Identity management vs. authentication: Know the difference

What is authentication, authorization and accounting (AAA)?

Top identity and access management risks

Best practices for a bulletproof IAM strategy

Key identity and access management benefits

Dig Deeper on Identity and access management