Content deleted Content added
article contains external links in the body; see WP:EL |
→Components: Username should not be considered as a secret known only to the user. It is practically public information in most cases. |
||
Line 14:
The use of two-factor authentication to prove one's identity is based on the premise that an unauthorized actor is unlikely to be able to supply both factors required for access. If, in an authentication attempt, at least one of the components is missing or supplied incorrectly, the user's identity is not established with sufficient certainty and access to the asset (e.g., a building, or data) being protected by two-factor authentication then remains blocked. The authentication factors of a two-factor authentication scheme may include:
* some physical object in the possession of the user, such as a USB stick with a secret token, a bank card, a key, etc.
* some secret known to the user, such as a
* some physical characteristic of the user (biometrics), such as a fingerprint, eye iris, voice, typing speed, pattern in key press intervals, etc.<ref>{{cite web|title=What is 2FA?|url=http://www.virtualdcs.co.uk/blog/should-two-factor-authentication-be-the-norm.html|accessdate=19 February 2015}}</ref>
|