Learn everything about Multifactor Authentication (MFA) and how you can start using it right now in your application.
Multifactor Authentication (MFA) is a method of identifyng users by presenting two or more separate authentication stages. 2-Factor Authentication (2FA) is the most used type of MFA.
Typically, Multifactor Authentication requires a combination of something the user knows, something the user has, and sometimes something the user is.
Multifactor Authentication is important to provide enhanced security to your critical systems. This will prevent attackers that only have one of these factors gaining access to your accounts, for example if your password is stolen, you will have another layer of protection.
The MFA extra layers could be triggered on abnormal or specific situations, such as login from a different device, location, or time frame.
Some of the most used multifactor options are:
Using Auth0 you can have MFA implemented in minutes! You can use the out-of-the-box providers or easily integrateany different provider using Auth0’s extensibility. To quickly implement MFA perform the following steps:
But the possibilities don’t end there, you can even create your own rules on when MFA will be triggered.
Adaptative Context-aware Multifactor allows you to enforce MFA or additional layers of authentication based on different conditions such as: geographic location, time of day/week, type of network, custom domains or certain IPs, or any arbitrary condition that can be expressed in code on the Auth0 platform.
By default multifactor is requested only once per month, but you can enforce it to be requested every time the user logs on, or even define your own rules to trigger MFA.
You can define rules such as when accessing mission-critical applications from outside of your company’s intranet, when accessing from a different device, or from a new location.
If you are using a different MFA provider or want to build your own, you can use the redirect
protocol in Auth0.
To use a custom MFA provider, you can interrupt the authentication transaction and redirect the user to an arbitrary URL where an additional authentication factor can happen. After this completes (successfully or not), the transaction can then resume in Auth0 for further processing. The following code shows how simple is to do that.
function(user, context, callback) {
if (condition() && context.protocol !== 'redirect') {
context.redirect = {
url: 'https://your_custom_mfa'
};
}
if (context.protocol === 'redirect') {
//TODO: handle the result of the MFA step
}
callback(null, user, context);
}
We’re HIPAA and SOC2 compliant, which assures you that we comply with all best practices of identity management. Additionally, if you require an extra layer of security you can turn on advanced policies like multifactor authentication, password policies, brute force protection and much more with just one click!
Start building today and secure your apps with the Auth0 identity platform today.