Skip to main content


         This documentation site is for previous versions. Visit our new documentation site for current releases.      
 

This content has been archived and is no longer being updated.

Links may not function; however, this content may be relevant to outdated versions of the product.

Authentication using two factors

Updated on September 13, 2021

This presentation is part of the Authentication Overview Self-Study Course.

Transcript

Two-factor authentication overcomes the weakness of passwords.  There are three universally recognized factors for authenticating individuals:

  1. 'Something you know', such as a secret password or PIN
  2. 'Something you have', such as a mobile phone, credit card or hardware security token
  3. 'Something you are', such as a fingerprint, a retinal scan, or other biometric characteristic

Two-factor authentication requires at least two of the authentication form factors mentioned above (typically the first two).  This makes it much more secure than traditional password authentication, which requires only one authentication factor (such as knowledge of a password) in order to gain access to a system.

Deployment of two-factor authentication devices, such as smart cards and hardware tokens, appears to be increasing.  More and more organizations are adding a layer of security to the desktop that requires users to physically possess a token, plus have knowledge of a PIN or password in order to access company data.

Have a question? Get answers now.

Visit the Support Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega.com is not optimized for Internet Explorer. For the optimal experience, please use:

Close Deprecation Notice
Contact us