Skip to main content

This content has been archived and is no longer being updated.

Links may not function; however, this content may be relevant to outdated versions of the product.

Authentication using two factors

Suggest edit Updated on September 13, 2021

This presentation is part of the Authentication Overview Self-Study Course.

Transcript

Two-factor authentication overcomes the weakness of passwords.  There are three universally recognized factors for authenticating individuals:

  1. 'Something you know', such as a secret password or PIN
  2. 'Something you have', such as a mobile phone, credit card or hardware security token
  3. 'Something you are', such as a fingerprint, a retinal scan, or other biometric characteristic

Two-factor authentication requires at least two of the authentication form factors mentioned above (typically the first two).  This makes it much more secure than traditional password authentication, which requires only one authentication factor (such as knowledge of a password) in order to gain access to a system.

Deployment of two-factor authentication devices, such as smart cards and hardware tokens, appears to be increasing.  More and more organizations are adding a layer of security to the desktop that requires users to physically possess a token, plus have knowledge of a PIN or password in order to access company data.

Did you find this content helpful? YesNo

0% found this useful

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Ready to crush complexity?

Experience the benefits of Pega Community when you log in.

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us