1 / 7

MFA

Azure Multi-Factor Authentication is an addition to a two-step verification process. This becomes quite a challenge for attackers to hack into someoneu2019s ID. Even if the hacker or attacker knows the user ID and password, it is useless without an additional authentication method.

william108
Download Presentation

MFA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction to Azure MFA

  2. What is MFA  • Azure PC Multi-Factor Authentication is an addition to a two-step verification process. This becomes quite a challenge for attackers to hack into someone’s ID. Even if the hacker or attacker knows the user ID and password, it is useless without an additional authentication method. This is a trusted security feature that can guarantee the solid security of your accounts. Various methods such as facial recognition, fingerprint access, registered mobile number, etc., are helpful in Multi-Factor Authentication.

  3. Authentication Factors Something you know (knowledge) • The most common knowledge factor is a password. Other knowledge factors include PINs, passphrases and security questions (e.g., What was the name of your high school?). These have become less secure as users fall victim to phishing attacks, hackers steal or buy passwords on the dark web, and people openly share personal information (answers to security questions) on social media sites.  Something you have (possession) • Possession factors include smartphones, hard tokens, soft tokens, key fobs and smartcards. To verify a user’s identity, they may receive a one-time passcode (OTP) sent to a smartphone, receive a unique code generated by a physical token, or need to insert a smartcard into a device.  Something you are (inheritance) • Inheritance factors, also referred to as biometrics, are the unique physical traits we all possess. Biometrics are verified through fingerprint scans, voice or facial recognition, retinal scans and other methods such as your heartbeat. Because biometrics require some sort of hardware for scanning, enterprises need to make sure users have access to the necessary equipment before implementation.

  4. Why is it Important to Use Multiple Factors of Authentication? • A single compromised password allowed hackers to disrupt the Colonial Pipeline because other forms of authentication were not required to access their VPN. Ransomware and other cyberattacks have become a top priority on the U.S. cybersecurity agenda. While cybersecurity training may be provided by organizations, employees still fall for phishing tactics or share passwords out of convenience. Customers can also fall victim to scams or have their data stolen. Azure MFA prevents bad actors from using compromised credentials to enter your systems because they cannot provide the second and/or third authentication factor.

  5. What are Benefits of MFA? • Increases Security By requiring users to provide multiple credentials prior to accessing accounts, hackers are prevented from using stolen passwords, devices, or other individual pieces of information to enter your network. A recent Ping Identity survey revealed that security and IT professionals consider Azure AD MFA to be the most effective security control to have in place for protecting on-premises and public cloud data. • Reduces Risk from Compromised Passwords While passwords are the most common form of authentication, they are the least secure. People may reuse or share passwords, which can also be stolen or guessed, leading to exposure for account holders and system administrators. A 2021 Verizon Data Breach Investigations Report found that 61 percent of breaches in 2020 were executed using unauthorized credentials.

  6. Customizable Security Solution • Each authentication factor offers multiple options, providing enterprises with the ability to customize the user experience to meet their needs. For example, users might have access to fingerprint scanners on their smartphones, but not retinal or voice recognition scanners. Two factors may be sufficient for some use cases, while others may require all three authentication factors. • Compatible with Single Sign-On (SSO) • MFA can be embedded into applications and integrated with single sign-on. Users no longer have to create multiple unique passwords or make the risky choice of reusing the same password for different applications when logging in. Together with SSO, MFA reduces friction while verifying the user’s identity, which saves time and improves productivity. • Scalable for Changing User Bases • Multi-factor authentication easily adapts to your business needs. MFA can be set up for all users, including employees, customers and partners. Single sign-on combined with MFA eliminates the need for multiple passwords, streamlines the login process, improves the user experience, and reduces the number of calls to IT departments for password assistance.

  7. Thankyou

More Related