User Authentication is a process that verifies a person’s identity allowing them access to an online service, connected device, or other resource.
Authenticating users occurs differently across services as business logic and risk profiles at enterprises can vary markedly. Tying together authentication solutions is a basic foundation that a user is required to present one, or a combination of, three authentication factors: knowledge, possession, and inherence. Contextual information gleaned from web browsers and mobile devices also is becoming more common in user authentication.
Network administrators and security teams at the service provider operate tools and set policies that comprise its identity and management (IAM) framework. Users are traditionally consumers or employees, however the Internet of Things’ emergence has shown that devices will authenticate to each other (M2M).
“Solutions based on the FIDO Alliance open standards are reimagining user authentication because of these products’ security and usability gains. When you have mobile-initiated login that is already MFA you don’t just check a lot of boxes. It hastens digital transformation initiatives because the UX gains are awesome.”