U2F & Adaptive MFA: Are They the Same? | OneLogin (2024)

Universal Second Factor, or U2F, is an authentication standard thatsimplifies multi-factorauthentication (MFA) by using physical devices as part of the userauthentication workflow. After a user enters their login credentials, theysimply press or tap a small device inserted in their computer’s USBport, which acts as their second factor. It’s convenient -- no driverinstallation required, just a supported browser. It’s also secure. U2Fprevents attacks like keylogging, phishing, and man-in-the-middle.

Where Did U2F Come From?

U2F was created and released by the FIDOAlliance, in an attempt to provide a safe and easy way for internet usersto log in. Google was a cofounder of the U2F group inside FIDO and nowsupports adding U2F as a second factor. A new set of specifications, built ontop of U2F, FIDO2, was alsorecently released by the FIDO Alliance.

Who Supports U2F?

Many prominent websites and applications support U2F, including, but notlimited to: Facebook, Bitbucket, GitHub, Gmail, and YouTube.

When it comes to browsers, the following currently provide U2F support:

  • Google Chrome, version 38 and above
  • Mozilla Firefox, version 57 and above
  • Opera, version 40 and above
  • Safari, on OS version 13.5.1 and above

On iOS devices, U2F can be used via Safari, whereas on Android devices, theU2F support is offered by both Google Chrome and the default Android browser.

You might be interested in:

What is Adaptive AuthenticationLearn how Adaptive Authentication can intelligently use machine learning to protect your company resources.Learn MoreKuppingerCole 2023 Leadership Compass for Access Management[GATED] One Identity as an Overall Leader in the 2023 Leadership Compass for Access Management.Download Report

What is Privileged Access Management?

Find out how Privileged Access Management works and why you need it from One Identity experts.

Learn More

How Do You Use U2F?

The portable U2F hardware can take the form of a USB, a Bluetooth-LE, or a Near-field communication device. These devices can be used to securely log in to any website on the internet that supports the U2F protocol. Here’s how a typical two-factor authentication with U2F works:

  1. The user visits a website (www.example.com), also known as the origin, that supports U2F. They open an account on the website and register their U2F device with it.
  2. The device creates a pair of keys: a public key and a private key. It securely stores the private key itself and asks the website to associate the public key with the user account. This unique key pair can only be used to login at www.example.com.
  3. After the user enters their login credentials at www.example.com, the website generates a unique challenge, using the user’s public key. The challenge can only be solved using the private key stored within the U2F device.
  4. Upon receiving the challenge, the U2F device signs it, using the private key for www.example.com, and sends it back to the website.
  5. The website verifies the unique signature, and allows the user to log in.

Remember, this five-step process may appear complicated, but it all happens behind-the-scenes. As far as the end-user is concerned, they just have to insert the U2F device and press a button (or tap).

The same U2F device can be used to register at different sites on the internet. Think of a U2F device as your personal, virtual keychain. This allows you to seamlessly and securely log in to your favorite websites.

U2F & Adaptive MFA: Are They the Same? | OneLogin (1)

Can U2F Be Hacked?

No authentication mechanism is categorically impervious to hacking. Withthat said, thus far, no breaches or vulnerabilities have been reported in theU2F protocol.

By design, it protects against phishing attacks. Even if a user is trickedinto thinking that a fake website is real, the authentication will failbecause of the public-private key mismatch.

U2F is also very good at detecting man-in-the-middle (MITM) attacks.Let’s suppose someone tries to intermediate the communication between awebsite and a user during the authentication process. As soon as theman-in-the-middle interferes, the U2F device will stop responding because itwill notice that the origin of the challenge is different from the registeredone.

What is Adaptive Multi-Factor Authentication (AMFA)?

Not all authentication requests are created equal. Adaptive multi-factorauthentication uses the context of a login attempt to determine inreal-time which authentication rules and policies to apply. AMFA uses variousfactors like consecutive login failures, level of requested access, IPaddress, location, device IDs, and time, etc. to tailor a user’s loginexperience.

Only use MFA when a user is determined to be of a high risk, for instance,using multiple incorrect login attempts, the request originating from a devicenot officially registered, or a login request for a server with sensitive dataafter office hours. By using adaptive multi-factor authentication, companiescan:

  • create a much-needed balance between user experience and strongsecurity
  • make it easy for trusted, low-risk people to log in
  • make it incredibly hard for potential intruders

How is AMFA Different From MFA?

MFA protects against password-related breaches by adding another layer ofsecurity. However, making end-users enroll for multi-factor authentication cansometimes be hard. And it makes sense. Waiting for and then entering aone-time password (OTP) can be a nuisance for people, especially if they haveto do it multiple times a day. Users just want to browse their social mediafeed, read an article, or stream a TV show; they don’t see a point inadding a second authentication factor for these seemingly trivial activities.Sure, you can make MFA compulsory, but that will (often) come at the cost ofcustomer unhappiness.

Creating a fine balance between security and user experience is hard, butoh-so-important. This is where adaptive MFA can come in handy. With adaptiveMFA, if the primary factor authentication for a user doesn’t looksuspicious or high-risk, they often don’t have to provide a secondaryfactor. This enhancement of the traditional MFA approach makes life much moreconvenient for regular users. For example:

Scenario 1: Consider a scenario where a customer, sayAllan, logs in to a web portal. He is on the same laptop that he has beenusing ever since he registered on the website. His IP puts him in the samecity as always. He got the password right in the first attempt. These, alongwith other factors, are used to determine that it’s indeed Allan who istrying to log in, and thus, the system doesn’t ask him to provide asecond factor.

Scenario 2: Now, imagine a hacker, say Adam, getsAllan’s login credentials. When Adam tries to log in, the systemrealizes that the login request has come from a new device and from adifferent geographical location. It classifies this request as high-risk andprompts Adam to provide a second factor. Since Adam can’t comply, theaccess is declined.

Combining U2F and Adaptive MFA – Best of Both Worlds

Adaptive MFA is a win-win for both end-user and service provider. The service provider is able to implement a rigorous-but-customer-friendly security policy and the end-user doesn’t have to provide secondary factors most of the time. But what if we combined U2F and adaptive MFA to form an even more customer-centric and impregnable authentication solution?

On the rare occasion that a customer has to provide a second factor, all they have to do is tap or press a button on their U2F device. This is much more convenient than opening another app to retrieve a passcode or waiting for an OTP message to arrive. For the service provider, this is far securer as well since the device communicates directly with the browser and it’s virtually impossible to replicate the key signature.

Conclusion

U2F reduces the risk of phishing, man-in-the-middle, and other dangerous cyberattacks while simplifying two-factor authentication. Adaptive MFA doesn’t ask regular users for secondary factors, but enforces it strictly at the first sign of suspicion. Using both together makes for a simple-yet-secure login.

See the OneLogin access management solution in action

Sign up to view anon-demand demo from theleader in the Access Management (AM) space. You'll learn how your organization can save timeand optimize resource allocation.

Request Demo

U2F & Adaptive MFA: Are They the Same? | OneLogin (2024)
Top Articles
Operant Conditioning: Token Economy – MCAT Psychology | MedSchoolCoach
Buying Bitcoin with Credit Card without KYC Verification
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Pearson Correlation Coefficient
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Foster Heidenreich CPA

Last Updated:

Views: 6058

Rating: 4.6 / 5 (56 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Foster Heidenreich CPA

Birthday: 1995-01-14

Address: 55021 Usha Garden, North Larisa, DE 19209

Phone: +6812240846623

Job: Corporate Healthcare Strategist

Hobby: Singing, Listening to music, Rafting, LARPing, Gardening, Quilting, Rappelling

Introduction: My name is Foster Heidenreich CPA, I am a delightful, quaint, glorious, quaint, faithful, enchanting, fine person who loves writing and wants to share my knowledge and understanding with you.