Content deleted Content added
Chris Caven (talk | contribs) m →top: Fixing style/layout errors |
Chris Caven (talk | contribs) m →top: Fixing style/layout errors |
||
Line 11:
== Components ==
The use of two-factor authentication to prove one's identity is based on the premise that an unauthorized actor is unlikely to be able to supply both factors required for access. If, in an authentication attempt, at least one of the components is missing or supplied incorrectly, the user's identity is not established with sufficient certainty and access to the asset (e.g., a building, or data) being protected by two-factor authentication then remains blocked. The authentication factors of a two-factor authentication scheme may include:
* some physical object in the possession of the user, such as a USB stick with a secret token, a bank card, a key, etc.
* some secret known to the user, such as a username, password, PIN, TAN, etc.
|