{"id":30481,"date":"2026-01-07T00:42:16","date_gmt":"2026-01-07T00:42:16","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?page_id=30481"},"modified":"2026-01-24T21:42:20","modified_gmt":"2026-01-24T21:42:20","slug":"glossary-term-multi-factor-authentication","status":"publish","type":"page","link":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa","title":{"rendered":"Glossary Term: Multi-factor Authentication"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"30481\" class=\"elementor elementor-30481\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4d147b7 e-flex e-con-boxed e-con e-parent\" data-id=\"4d147b7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e377152 e-con-full e-flex e-con e-child\" data-id=\"e377152\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3dc81d2 elementor-widget elementor-widget-heading\" data-id=\"3dc81d2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span style=\"color:black\">Glossary Term:<\/span> Multi-factor Authentication (MFA)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fda1724 elementor-widget elementor-widget-heading\" data-id=\"fda1724\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A security method that requires users to provide two or more verification factors to gain access to systems or applications. Common factors include something you know (password), something you have (phone or token), and something you are (fingerprint or facial recognition).\u00a0\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7c84ae elementor-widget elementor-widget-ucaddon_blox_btn_group\" data-id=\"b7c84ae\" data-element_type=\"widget\" data-widget_type=\"ucaddon_blox_btn_group.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Button Group -->\n<style>\/* widget: Button Group *\/\n\n#uc_blox_btn_group_elementor_b7c84ae\n{\n  display:flex;\n  flex-wrap: wrap;\n}\n\n#uc_blox_btn_group_elementor_b7c84ae a\n{\n  display:block;\n  text-decoration:none;\n  transition:0.3s;\n\n}\n\n#uc_blox_btn_group_elementor_b7c84ae .blox_btn_group_inner\n{\n  display:inline-flex;\n  align-items:center;\n}\n\n#uc_blox_btn_group_elementor_b7c84ae .blox_btn_group_inner .ue-btn-icon\n{\n  line-height:1em;\n}\n\n#uc_blox_btn_group_elementor_b7c84ae .blox_btn_group_inner .ue-btn-icon svg\n{\n  height:1em;\n  width:1em;\n}\n\n<\/style>\n\n<div id=\"uc_blox_btn_group_elementor_b7c84ae\" class=\"blox_btn_group\">\n  <a class=\"elementor-repeater-item-9a60fb7 elementor-animation-shrink\" href=\"\/en\/glossary\" id=\"uc_blox_btn_group_elementor_b7c84ae_item1\" >\n  <div class=\"blox_btn_group_inner\">\n        <div class=\"ue-btn-icon\"><i class='fas fa-arrow-left'><\/i><\/div>\n        <div class=\"ue-btn-txt\">Glossary<\/div>\n  <\/div>\n<\/a>\n\n  \n\n\n<\/div>\n<!-- end Button Group -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a98052d e-flex e-con-boxed e-con e-parent\" data-id=\"a98052d\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8da594a e-con-full e-flex e-con e-child\" data-id=\"8da594a\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4852a6d e-con-full e-flex e-con e-child\" data-id=\"4852a6d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc3f527 elementor-widget elementor-widget-text-editor\" data-id=\"fc3f527\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW30895059 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW30895059 BCX8\">Multi-Factor Authentication (MFA) is a security method that requires users to provide two or more verification factors to gain access to applications, systems, or accounts. Rather than relying solely on a username and password, MFA adds\u00a0<\/span><span class=\"NormalTextRun SCXW30895059 BCX8\">additional<\/span><span class=\"NormalTextRun SCXW30895059 BCX8\">\u00a0layers of authentication that make it significantly harder for attackers to gain unauthorized access, even if\u00a0<\/span><span class=\"NormalTextRun SCXW30895059 BCX8\">they&#8217;ve<\/span><span class=\"NormalTextRun SCXW30895059 BCX8\">\u00a0compromised a user&#8217;s primary credentials.<\/span><\/span><span class=\"EOP SCXW30895059 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a8a69c3 e-con-full e-flex e-con e-child\" data-id=\"a8a69c3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27facce elementor-widget elementor-widget-heading\" data-id=\"27facce\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How Does MFA Work? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1504a9 elementor-widget elementor-widget-text-editor\" data-id=\"c1504a9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">MFA works on the principle that authentication factors fall into three main categories: something you know (like a password), something you have (like a smartphone or hardware token), and something you are (like a fingerprint or facial recognition). By requiring multiple factors from\u00a0different categories, MFA creates a more robust security barrier.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">When a user\u00a0attempts\u00a0to log in, they enter their username and password as the first factor. The system then prompts for a second factor, which could be a code sent to their mobile device, a push notification on an authenticator app, or a biometric scan. Only after successfully providing all required factors does the system grant access.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">For privileged operations like administrative tasks, MFA can be\u00a0required\u00a0at the point of elevation rather than just at login. This approach provides an\u00a0additional\u00a0security checkpoint when users need elevated permissions for specific actions.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9ce8e9 e-con-full e-flex e-con e-child\" data-id=\"a9ce8e9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d081dbf elementor-widget elementor-widget-heading\" data-id=\"d081dbf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Types of MFA Factors <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c25cd7 elementor-widget elementor-widget-text-editor\" data-id=\"3c25cd7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Authentication factors are typically categorized into three main types, each providing different security benefits:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">Knowledge Factors (Something You Know)<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ul><li><span data-contrast=\"auto\">Passwords and passphrases<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span data-contrast=\"auto\">PIN codes<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span data-contrast=\"auto\">Security questions<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span data-contrast=\"auto\">Pattern recognition<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><p><b><span data-contrast=\"auto\">Possession Factors (Something You Have)<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ul><li><span data-contrast=\"auto\">Smartphone apps like Microsoft Authenticator or Google Authenticator<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span data-contrast=\"auto\">Hardware security keys (FIDO2\/WebAuthn\u00a0tokens)<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span data-contrast=\"auto\">Smart cards<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span data-contrast=\"auto\">SMS codes sent to registered devices<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul><p><b><span data-contrast=\"auto\">Inherence Factors (Something You Are)<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ul><li><span data-contrast=\"auto\">Fingerprint scanning<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span data-contrast=\"auto\">Facial recognition<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span data-contrast=\"auto\">Voice recognition<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li><span data-contrast=\"auto\">Retinal or iris scanning<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-505e657 e-con-full e-flex e-con e-child\" data-id=\"505e657\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b11b39b elementor-widget elementor-widget-heading\" data-id=\"b11b39b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Common MFA Methods <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa2e7a3 elementor-widget elementor-widget-text-editor\" data-id=\"fa2e7a3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Organizations can choose from several MFA implementation methods based on their security requirements and user experience needs:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">Push Notifications<\/span><\/b><span data-contrast=\"auto\">\u00a0send alerts to users&#8217; registered devices, allowing them to approve or deny authentication requests with a simple tap. This method provides good security while\u00a0maintaining\u00a0user convenience.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">Time-based One-Time Passwords (TOTP)<\/span><\/b><span data-contrast=\"auto\">\u00a0generate temporary codes that expire after\u00a0a short period, typically 30 seconds. Users enter these codes from authenticator apps to complete the authentication process.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">SMS and Voice Calls<\/span><\/b><span data-contrast=\"auto\">\u00a0deliver verification codes through text messages or automated phone calls. While widely supported, these methods are considered less secure than app-based alternatives due to potential SIM swapping attacks.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">Hardware Security Keys<\/span><\/b><span data-contrast=\"auto\">\u00a0provide the highest level of security by requiring users to physically insert or touch a dedicated authentication device. These keys support modern standards like FIDO2 and\u00a0WebAuthn.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0d08128 e-con-full e-flex e-con e-child\" data-id=\"0d08128\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79dbb91 elementor-widget elementor-widget-heading\" data-id=\"79dbb91\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why MFA Matters for Security <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-984341d elementor-widget elementor-widget-text-editor\" data-id=\"984341d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Password-based attacks\u00a0remain\u00a0one of the most common methods cybercriminals use to breach systems. According to the\u00a0<\/span><a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\"><span data-contrast=\"none\">Verizon Data Breach Investigations Report<\/span><\/a><span data-contrast=\"auto\">, credential-based attacks account for\u00a0a significant portion\u00a0of successful data breaches.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">MFA dramatically reduces the risk of successful attacks because compromising multiple authentication factors is exponentially more difficult than stealing a single password. Even if attackers obtain a user&#8217;s password through phishing, data breaches, or brute force attacks, they still need access to the\u00a0additional\u00a0authentication factors.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">This protection is particularly important for privileged accounts and administrative access, where successful compromise can lead to widespread system damage. When MFA protects elevation to administrative privileges, it prevents malware and attackers from automatically inheriting elevated permissions even if\u00a0they&#8217;ve\u00a0compromised a user&#8217;s standard credentials.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3e8a91b e-con-full e-flex e-con e-child\" data-id=\"3e8a91b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60149b8 elementor-widget elementor-widget-heading\" data-id=\"60149b8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MFA vs Two-Factor Authentication (2FA) <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d88ee2 elementor-widget elementor-widget-text-editor\" data-id=\"4d88ee2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">While often used interchangeably, MFA and Two-Factor Authentication (2FA) have a technical distinction. 2FA specifically requires exactly two authentication factors, while MFA can\u00a0require\u00a0two or more factors.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">In practice, most implementations use exactly two factors, making 2FA and MFA functionally equivalent in most business environments. However, high-security environments may require three or more factors for accessing particularly sensitive systems or data.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4da430c e-con-full e-flex e-con e-child\" data-id=\"4da430c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ce7b8d elementor-widget elementor-widget-heading\" data-id=\"6ce7b8d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Benefits of MFA Implementation <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-591532f elementor-widget elementor-widget-text-editor\" data-id=\"591532f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Implementing MFA provides several important security and business benefits for organizations:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">Attack Prevention<\/span><\/b><span data-contrast=\"auto\">: MFA blocks\u00a0the vast majority of\u00a0automated attacks and credential stuffing attempts, significantly reducing successful unauthorized access attempts.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">Compliance Support<\/span><\/b><span data-contrast=\"auto\">: Many regulatory frameworks and security standards require or strongly recommend MFA for accessing sensitive data or systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">Reduced Password Risk<\/span><\/b><span data-contrast=\"auto\">: With MFA enabled, the security impact of password breaches, weak passwords, or password reuse is dramatically reduced.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">User Accountability<\/span><\/b><span data-contrast=\"auto\">: MFA creates a stronger link between user identity and actions, improving audit trails and accountability for privileged operations.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">Cost-Effective Security<\/span><\/b><span data-contrast=\"auto\">: Compared to the potential cost of a data breach, MFA implementation provides high security value at\u00a0relatively low\u00a0cost.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3338ed e-con-full e-flex e-con e-child\" data-id=\"d3338ed\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e475e8 elementor-widget elementor-widget-heading\" data-id=\"8e475e8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MFA in Privileged Access Management <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b6b538 elementor-widget elementor-widget-text-editor\" data-id=\"9b6b538\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">MFA for privileged access means requiring\u00a0additional\u00a0authentication when users request administrative privileges, not just at login. This prevents malware from automatically gaining admin rights if it infects a user&#8217;s system.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Instead of making users authenticate twice for every login, elevation MFA only triggers when someone needs to run applications as administrator or start an admin session. This protects high-risk operations while keeping normal work uninterrupted.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Admin By Request includes an MFA elevation mode that works with Office 365 and SAML identity providers. Users complete MFA authentication before receiving elevated privileges. This requires the identity provider to have MFA already configured. All MFA-protected elevations are logged for audit purposes.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b8c4b7 elementor-align-right elementor-mobile-align-justify elementor-widget elementor-widget-button\" data-id=\"8b8c4b7\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"#\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-arrow-up\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back to top<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Glossary Term: Multi-factor Authentication (MFA) A security method that requires users to provide two or more verification factors to gain access to systems or applications. Common factors include something you know (password), something you have (phone or token), and something you are (fingerprint or facial recognition).\u00a0\u00a0 Glossary Multi-Factor Authentication (MFA) is a security method that [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"ppma_author":[402],"class_list":["post-30481","page","type-page","status-publish","hentry","entry"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Glossary Term: Multi-factor Authentication (MFA) A security method that requires users to provide two or more verification factors to gain access to systems or applications. Common factors include something you know (password), something you have (phone or token), and something you are (fingerprint or facial recognition). Glossary Multi-Factor Authentication (MFA) is a security method that\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Glossary Term: Multi-factor Authentication \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Glossary Term: Multi-factor Authentication (MFA) A security method that requires users to provide two or more verification factors to gain access to systems or applications. Common factors include something you know (password), something you have (phone or token), and something you are (fingerprint or facial recognition). Glossary Multi-Factor Authentication (MFA) is a security method that\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2026-01-07T00:42:16+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-24T21:42:20+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Glossary Term: Multi-factor Authentication \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Glossary Term: Multi-factor Authentication (MFA) A security method that requires users to provide two or more verification factors to gain access to systems or applications. Common factors include something you know (password), something you have (phone or token), and something you are (fingerprint or facial recognition). Glossary Multi-Factor Authentication (MFA) is a security method that\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-mfa#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-mfa#listItem\",\"name\":\"Glossary Term: Multi-factor Authentication\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-mfa#listItem\",\"position\":2,\"name\":\"Glossary Term: Multi-factor Authentication\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-mfa\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-mfa\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-mfa#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-mfa\",\"name\":\"Glossary Term: Multi-factor Authentication \\u00bb Admin By Request\",\"description\":\"Glossary Term: Multi-factor Authentication (MFA) A security method that requires users to provide two or more verification factors to gain access to systems or applications. Common factors include something you know (password), something you have (phone or token), and something you are (fingerprint or facial recognition). Glossary Multi-Factor Authentication (MFA) is a security method that\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary-term-mfa#breadcrumblist\"},\"datePublished\":\"2026-01-07T00:42:16+00:00\",\"dateModified\":\"2026-01-24T21:42:20+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Glossary Term: Multi-factor Authentication \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Glossary Term: Multi-factor Authentication \u00bb Admin By Request","description":"Glossary Term: Multi-factor Authentication (MFA) A security method that requires users to provide two or more verification factors to gain access to systems or applications. Common factors include something you know (password), something you have (phone or token), and something you are (fingerprint or facial recognition). Glossary Multi-Factor Authentication (MFA) is a security method that","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa#listItem","name":"Glossary Term: Multi-factor Authentication"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa#listItem","position":2,"name":"Glossary Term: Multi-factor Authentication","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa","name":"Glossary Term: Multi-factor Authentication \u00bb Admin By Request","description":"Glossary Term: Multi-factor Authentication (MFA) A security method that requires users to provide two or more verification factors to gain access to systems or applications. Common factors include something you know (password), something you have (phone or token), and something you are (fingerprint or facial recognition). Glossary Multi-Factor Authentication (MFA) is a security method that","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa#breadcrumblist"},"datePublished":"2026-01-07T00:42:16+00:00","dateModified":"2026-01-24T21:42:20+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Glossary Term: Multi-factor Authentication \u00bb Admin By Request","og:description":"Glossary Term: Multi-factor Authentication (MFA) A security method that requires users to provide two or more verification factors to gain access to systems or applications. Common factors include something you know (password), something you have (phone or token), and something you are (fingerprint or facial recognition). Glossary Multi-Factor Authentication (MFA) is a security method that","og:url":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2026-01-07T00:42:16+00:00","article:modified_time":"2026-01-24T21:42:20+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Glossary Term: Multi-factor Authentication \u00bb Admin By Request","twitter:description":"Glossary Term: Multi-factor Authentication (MFA) A security method that requires users to provide two or more verification factors to gain access to systems or applications. Common factors include something you know (password), something you have (phone or token), and something you are (fingerprint or facial recognition). Glossary Multi-Factor Authentication (MFA) is a security method that","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"30481","title":"#post_title #separator_sa #site_title","description":"#post_content","keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":null,"og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":null,"robots_max_videopreview":null,"robots_max_imagepreview":"large","priority":null,"frequency":null,"local_seo":null,"seo_analyzer_scan_date":"2026-01-24 22:19:40","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2026-01-07 00:40:39","updated":"2026-01-24 22:19:40"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tGlossary Term: Multi-factor Authentication\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Glossary Term: Multi-factor Authentication","link":"https:\/\/www.adminbyrequest.com\/en\/glossary-term-mfa"}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/30481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=30481"}],"version-history":[{"count":6,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/30481\/revisions"}],"predecessor-version":[{"id":30500,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/30481\/revisions\/30500"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=30481"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=30481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}