120:
182:
24:
65:
275:), but strong authentication is not necessarily multi-factor authentication. Soliciting multiple answers to challenge questions may be considered strong authentication but, unless the process also retrieves "something you have" or "something you are", it would not be considered multi-factor authentication. The
279:
issued supplemental guidance on this subject in August 2006, in which they clarified, "By definition true multifactor authentication requires the use of solutions from two or more of the three categories of factors. Using multiple solutions from the same category ... would not constitute multifactor
296:
protocol. This type of definition is found in the
Handbook of applied cryptography. This type of definition does not necessarily relate to two-factor authentication, since the
303:
An other class of definitions says that strong authentication is any form of authentication in which the verification is accomplished without the transmission of a
276:
83:
130:
329:
has been striving to establish technical specifications for strong authentication and has 250 members and over 150 certified products.
384:
37:
138:
369:
243:
225:
163:
101:
51:
406:"Frequently Asked Questions on FFIEC Guidance on Authentication in an Internet Banking Environment, August 15, 2006"
207:
493:
498:
319:
192:
272:
300:
used in a challenge–response authentication scheme can be simply derived from a password (one factor).
43:
465:
354:
268:
379:
374:
203:
134:
315:
293:
199:
79:
8:
145:
405:
487:
364:
326:
289:
403:
429:
451:
349:
297:
210:. Statements consisting only of original research should be removed.
308:
304:
307:. This is the case for example with the definition found in the
262:
466:"FIDO Alliance Passes 150 Post-Password Certified Products"
359:
292:
process, or more precisely, authentication based on a
314:
An other class, which has legal standing within the
288:A commonly found class of definitions relates to a
74:
may be too technical for most readers to understand
404:Board of Governors of the Federal Reserve System.
485:
267:Strong authentication is often confused with
52:Learn how and when to remove these messages
263:Difference with two-factor authentication
244:Learn how and when to remove this message
226:Learn how and when to remove this message
164:Learn how and when to remove this message
102:Learn how and when to remove this message
86:, without removing the technical details.
144:Relevant discussion may be found on the
486:
385:Identity threat detection and response
259:is a notion with several definitions.
468:. InfoSecurity Magazine. 5 April 2016
84:make it understandable to non-experts
327:Fast IDentity Online (FIDO) Alliance
175:
113:
58:
17:
13:
430:"Handbook of Applied Cryptography"
370:Initiative for Open Authentication
340:is defined in the context of use.
336:can be used as long as the notion
14:
510:
33:This article has multiple issues.
180:
118:
63:
22:
41:or discuss these issues on the
458:
444:
422:
397:
320:Strong Customer Authentication
283:
1:
390:
7:
343:
273:multi-factor authentication
206:the claims made and adding
10:
515:
355:Electronic authentication
271:(more generally known as
269:two-factor authentication
432:. Cacr.math.uwaterloo.ca
127:This article or section
494:Computer access control
380:Self-sovereign identity
375:Reliance authentication
499:Authentication methods
452:"Fermilab | Home"
316:European Economic Area
334:strong authentication
257:Strong authentication
131:synthesis of material
294:challenge–response
191:possibly contains
141:to the main topic.
135:verifiably mention
129:possibly contains
280:authentication."
254:
253:
246:
236:
235:
228:
193:original research
174:
173:
166:
112:
111:
104:
56:
506:
478:
477:
475:
473:
462:
456:
455:
448:
442:
441:
439:
437:
426:
420:
419:
417:
415:
410:
401:
249:
242:
231:
224:
220:
217:
211:
208:inline citations
184:
183:
176:
169:
162:
158:
155:
149:
122:
121:
114:
107:
100:
96:
93:
87:
67:
66:
59:
48:
26:
25:
18:
514:
513:
509:
508:
507:
505:
504:
503:
484:
483:
482:
481:
471:
469:
464:
463:
459:
450:
449:
445:
435:
433:
428:
427:
423:
413:
411:
408:
402:
398:
393:
346:
332:Thus, the term
311:documentation.
286:
265:
250:
239:
238:
237:
232:
221:
215:
212:
197:
185:
181:
170:
159:
153:
150:
143:
133:which does not
123:
119:
108:
97:
91:
88:
80:help improve it
77:
68:
64:
27:
23:
12:
11:
5:
512:
502:
501:
496:
480:
479:
457:
443:
421:
395:
394:
392:
389:
388:
387:
382:
377:
372:
367:
362:
357:
352:
345:
342:
285:
282:
264:
261:
252:
251:
234:
233:
188:
186:
179:
172:
171:
126:
124:
117:
110:
109:
71:
69:
62:
57:
31:
30:
28:
21:
9:
6:
4:
3:
2:
511:
500:
497:
495:
492:
491:
489:
467:
461:
453:
447:
431:
425:
407:
400:
396:
386:
383:
381:
378:
376:
373:
371:
368:
366:
365:FIDO Alliance
363:
361:
358:
356:
353:
351:
348:
347:
341:
339:
335:
330:
328:
323:
321:
317:
312:
310:
306:
301:
299:
295:
291:
290:cryptographic
281:
278:
274:
270:
260:
258:
248:
245:
230:
227:
219:
209:
205:
201:
195:
194:
189:This article
187:
178:
177:
168:
165:
157:
147:
142:
140:
136:
132:
125:
116:
115:
106:
103:
95:
85:
81:
75:
72:This article
70:
61:
60:
55:
53:
46:
45:
40:
39:
34:
29:
20:
19:
16:
470:. Retrieved
460:
446:
434:. Retrieved
424:
412:. Retrieved
399:
337:
333:
331:
324:
313:
302:
287:
266:
256:
255:
240:
222:
213:
190:
160:
151:
128:
98:
89:
73:
49:
42:
36:
35:Please help
32:
15:
284:Definitions
92:August 2017
488:Categories
391:References
350:3-D Secure
298:secret key
216:April 2019
200:improve it
154:April 2019
38:improve it
204:verifying
146:talk page
44:talk page
344:See also
309:Fermilab
305:password
472:13 June
436:17 July
198:Please
78:Please
414:22 May
338:strong
139:relate
409:(PDF)
318:, is
277:FFIEC
474:2016
438:2014
416:2012
325:The
360:EMV
202:by
137:or
82:to
490::
322:.
47:.
476:.
454:.
440:.
418:.
247:)
241:(
229:)
223:(
218:)
214:(
196:.
167:)
161:(
156:)
152:(
148:.
105:)
99:(
94:)
90:(
76:.
54:)
50:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.