| Lesson 4 | What are the key authentication techniques? |
| Objective | Identify key authentication techniques. |
Key Authentication Techniques
Authentication is the process of proving that a user, service, or device is actually who it claims to be. Once the system can trust an identity, it can make authorization decisions, what that identity is allowed to do.
Modern security assumes that identities can be impersonated and credentials can be stolen. Because of that, strong authentication is now layered, audited, and continuous. At minimum, organizations are expected to require multi-factor authentication (MFA) for administrative access and sensitive data.
Core authentication factors
Every authentication method is based on one (or more) of the following factors:
- Something you know – A secret that only you should know, such as a password or passphrase.
- Something you have – A physical or virtual object in your possession, such as a hardware token, mobile authenticator app, smart card, or FIDO2 security key.
- Something you are – A biometric characteristic, such as a fingerprint, face scan, or voiceprint.
A single factor on its own (for example, just a password) is considered weak. Modern systems combine factors to resist phishing, credential reuse, and replay attacks.
Multi-factor authentication (MFA)
Multi-factor authentication requires two or more independent factors during login. A common pattern is:
- Password or passphrase (something you know)
- Plus a time-based one-time code or push approval from an authenticator app (something you have)
MFA dramatically reduces the success rate of stolen-password attacks. In most environments - cloud consoles, VPN gateways, remote desktop access, privileged Active Directory roles, production database access - MFA is no longer optional. It is baseline.
Password and passphrase security
Traditional short passwords are easy to guess, easy to reuse across sites, and easy to steal. A better approach is:
- Passphrases: Longer phrases that are memorable to a human but hard to brute-force. Example: a sentence with spacing or punctuation, rather than an 8-character word with substitutions like
@ for a.
- Modern hashing and encryption: Credentials at rest should be protected with strong cryptography. Legacy ciphers such as DES are considered obsolete. Use modern algorithms such as AES for encryption and SHA-256 or stronger for hashing secrets.
- Rate limiting and lockout policies: Repeated failed logins should trigger throttling, alerts, or temporary lockouts to slow down brute-force attempts.
One-time passwords and authenticator apps
A one-time password (OTP) is valid only for a short window, typically 30–60 seconds. Because the code expires almost immediately and cannot be reused, an attacker who observes it later gains nothing.
Common implementations include:
- TOTP/HOTP apps (for example, an authenticator app on your phone that generates rotating 6-digit codes offline)
- Push-based approval (the app sends a prompt to your phone, and you tap Approve to continue)
- Hardware tokens that display a constantly changing code
These OTP methods satisfy the “something you have” factor without relying on email or SMS. SMS can still be used, but it is vulnerable to SIM swap attacks, so it should be considered a fallback rather than primary.
Passwordless and security keys
Passwordless authentication removes the static password entirely. Instead, the login flow uses:
- FIDO2 / WebAuthn security keys - a USB/NFC/Bluetooth device that proves possession and performs a cryptographic challenge/response, often protected by a fingerprint or PIN on the device itself.
- Platform biometrics - for example, device-bound Face ID / fingerprint unlock to release a private key stored in secure hardware (TPM / Secure Enclave).
In this model, nothing reusable (like a password) ever crosses the network. Phishing becomes much harder because the authenticator will only sign in to approved origins.
Token-based authentication
After a user or service successfully authenticates, the system can issue a time-limited token proving that identity. That token is then presented on each subsequent request instead of sending the raw credentials again.
Examples:
- Session tokens / bearer tokens issued after login to a web app or API
- JSON Web Tokens (JWTs) carrying signed claims about the user, such as user ID, scopes/roles, and expiration time
The important rule: tokens must expire. A long-lived token with no expiration is essentially a leaked password that never times out.
Certificate-based authentication
Certificate-based authentication uses digital certificates and public key cryptography to prove identity. This is common for:
- Mutual TLS (mTLS), where both the client and the server present certificates. The client proves “I am an approved device/service,” not just “I typed a password.”
- Smart cards / PIV cards, where the private key never leaves the card. Unlocking the card (PIN + physical card) satisfies “something you have” plus “something you know.”
Certificate-based approaches are strong because the private key is difficult to extract and the certificate itself can be revoked centrally.
Why single sign-on (SSO) matters
Single Sign-On lets a user authenticate once with a trusted identity provider, then access multiple internal applications without creating a new username and password for each one.
SSO improves security in two ways:
- Central policy enforcement: The identity provider can enforce MFA, passwordless login, device posture checks, and account lockouts in one place.
- Fewer credentials to steal: Users don’t scatter weak passwords across 15 different apps. You get fewer local accounts to audit and disable when someone leaves the company.
Defense against credential theft
Attackers routinely try to:
- Capture credentials in transit (for example, through phishing pages or man-in-the-middle proxies)
- Guess weak or reused passwords
- Replay previously stolen passwords or tokens
To defend against this, modern authentication strategies combine:
- MFA or passwordless authentication
- Short-lived, signed tokens with enforced expiration
- Encryption standards such as AES (not legacy ciphers like DES) to protect stored secrets
- Continuous monitoring and alerting for unusual login behavior
The goal is not just “let the right person in once,” but “keep verifying that the session is still legitimate.”
Authentication Methods - Quiz
[1]System snooping: The action of a hacker who enters a computer network and begins mapping the contents of the system.
