You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/standards/nist-authentication-basics.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ For information on TPMs and Windows, see [Trusted Platform Module](/windows/secu
52
52
53
53
You can group authentication factors into three categories:
54
54
55
-

55
+

56
56
57
57
Authentication factor strength is determined by how sure you are it's something only the subscriber is, knows, or has. The NIST organization provides limited guidance on authentication factor strength. Use the information in the following section to learn how Microsoft assesses strengths.
58
58
@@ -89,7 +89,7 @@ SOFA-B framework to quantify biometrics strength:
89
89
90
90
You can implement single-factor authentication by using an authenticator that verifies something you know, or are. A something-you-are factor is accepted as authentication, but it's not accepted solely as an authenticator.
@@ -105,14 +105,14 @@ MFA requires two authentication factors, which can be independent. For example:
105
105
106
106
These methods enable two independent authentication transactions with Azure Active Directory (Azure AD).
107
107
108
-

108
+

109
109
110
110
111
111
### MFA with one multi-factor authenticator
112
112
113
113
Multifactor authentication requires one factor (something you know, or are) to unlock a second factor. This user experience is easier than multiple independent authenticators.
114
114
115
-

115
+

116
116
117
117
One example is the Microsoft Authenticator app, in passwordless mode: the user access to a secured resource (relying party), and receives notification on the Authenticator app. The user provides a biometric (something you are) or a PIN (something you know). This factor unlocks the cryptographic key on the phone (something you have), which the verifier validates.
0 commit comments