What is Three-Factor Authentication? | Definition from TechTarget (2024)

What is Three-Factor Authentication? | Definition from TechTarget (1)

By

  • Alexander S. Gillis,Technical Writer and Editor

What is three-factor authentication (3FA)?

Three-factor authentication (3FA) is the use of identity-confirming credentials from three separate categories of authentication factors -- typically, the knowledge, possession and inherence categories.

This type of multifactor authentication (MFA) improves security over single- or two-factor authentication (2FA), as it's unlikely that an attacker could fake or steal all three elements involved in 3FA. 3FA is useful for organizations that handle sensitive data and require a high level of security for logins.

Authentication factors classically fall into the following three categories:

  1. Knowledge factors -- also referred to as something you know -- include things a user must know in order to log in. These include usernames, IDs, passwords and personal identification numbers (PINs).
  2. Possession factors -- also referred to as something you have -- include anything a user must have in their possession to log in. This category includes one-time password tokens, key fobs, smartphones with OTP apps, employee ID cards and SIM cards.
  3. Inherence factors -- also referred to as something you are -- include any biological traits the user has that are confirmable for log in. This category includes the scope of biometrics, such as retina scans, iris scans, fingerprint scans, facial recognition, voice recognition, hand geometry and even earlobe geometry. For example, biometric data is commonly used in smartphones that use fingerprint scanners or facial recognition.
What is Three-Factor Authentication? | Definition from TechTarget (2)

Three-factor authentication use cases

Three-factor authentication is more secure than 2FA, as it requires users to provide three proofs of identity, as opposed to the two different proofs 2FA requires. The use of at least one element from each category is required for a system to be considered three-factor authentication -- selecting three authentication factors from two categories qualifies only as 2FA.

As such, 3FA is commonly used by businesses that require a high level of security. For example, 3FA may be used by businesses, universities and colleges, government agencies and healthcare organizations for accessing accounts and making transactions.

What is Three-Factor Authentication? | Definition from TechTarget (3)

Using three-factor authentication

The reliability of authentication is affected by the number of factors involved, as well as how they're implemented. In each category, the choices made for authentication rules greatly affect the security of each factor.

Poor or absent password rules, for example, can result in the creation of weak passwords like guest, which defeat the value of a password. Best practices include requiring inherently strong passwords that are updated regularly.

Biometric security systems that use facial recognition could be defeated if an individual holds up a picture of the authorized user. More sophisticated systems might have more secure requirements, such as a depth scan or compelling the user to blink for their retina scan to register. Lax rules and implementations result in weaker security; alternatively, better rules can yield better security per factor.

What is Three-Factor Authentication? | Definition from TechTarget (4)

3FA vs. 2FA

The biggest difference between 2FA and 3FA is that 3FA requires the use of one more distinct security factor than 2FA. This makes 3FA a more secure form of MFA.

2FA is used in a number of places, including automated teller machines, where an individual must provide a card (possession factor) and a PIN (knowledge factor) to gain access. 3FA access might require a system login that requires a PIN, OTP and fingerprint scan.

Although 3FA is generally considered more secure, if poorly implemented, a system that uses 2FA could be more secure -- as two stronger, well-implemented factors are more secure than three weak authentication factors. Some 2FA factors, however, are also starting to be treated as a paid-only feature by social media companies.

Additional factors, such as location or time, can also be employed to create four-factor authentication.

Learn more about common authentication factors, such as location and time factors.

This was last updated in March 2023

Continue Reading About three-factor authentication (3FA)

  • Three examples of multifactor authentication use cases
  • MFA technology is rapidly evolving -- are mandates next?
  • Multifactor authentication methods in your organization
  • Exploring multifactor authentication benefits and technology

Related Terms

out-of-band authentication
Out-of-band authentication is a type of two-factor authentication (2FA) that requires a secondary verification method through a ...Seecompletedefinition
What is a SSL (secure sockets layer)?
Secure sockets layer (SSL) is a networking protocol designed for securing connections between web clients and web servers over an...Seecompletedefinition
What is role-based access control (RBAC)?
Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an ...Seecompletedefinition

Dig Deeper on Identity and access management

  • possession factorBy: RahulAwati
  • Google AuthenticatorBy: RobertSheldon
  • single-factor authentication (SFA)By: TechTargetContributor
  • two-step verificationBy: IvyWigmore
What is Three-Factor Authentication? | Definition from TechTarget (2024)

References

Top Articles
Latest Posts
Article information

Author: Arline Emard IV

Last Updated:

Views: 5354

Rating: 4.1 / 5 (72 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Arline Emard IV

Birthday: 1996-07-10

Address: 8912 Hintz Shore, West Louie, AZ 69363-0747

Phone: +13454700762376

Job: Administration Technician

Hobby: Paintball, Horseback riding, Cycling, Running, Macrame, Playing musical instruments, Soapmaking

Introduction: My name is Arline Emard IV, I am a cheerful, gorgeous, colorful, joyous, excited, super, inquisitive person who loves writing and wants to share my knowledge and understanding with you.