Child pages
  • MFA Technologies, Threats, and Usage

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

AuthN Type NumberAuthentication FactorResistance to Threat
Theft
  (Phishing, etc.)
Theft via Dynamic MITM  PhishingGuessing / Offline CrackingMFA Device
 Compromise
User Workstation Compromise
1PasswordLowLowDependsn/aLow
2Phone call - See Voice Requirements 1LowLowHighLowHigh
3Phone call (VoIP) - See Additional
 VoIP Restrictions 2
LowLowMediumLowHigh
4SMSLowLowHighLowHigh
5SMS (VoIP) See VoIP restrictions 2LowLowMediumLowHigh
6HOTP cell phone software 1,3MediumLowHighMediumHigh
7TOTP cell phone software 1,3MediumLowHighMediumHigh
8HOTP tokenMediumLowHighHighHigh
9TOTP tokenMediumLowHighHighHigh
10HOTP written (back up codes)LowLowHighHighLow
11DUO PushHighLowHighMediumHigh
12FIDO U2F token with passwordHighHighHighHighHigh
13PKI device certificate with
  device password
HighHighHighHighMedium
14PKI token certificate wth token
  password
HighHighHighHighHigh

...