Please enable JavaScript.
Coggle requires JavaScript to display documents.
Authentication Methods - Coggle Diagram
- Knowledge-based Authentication
-
-
- PIN (Personal Identification Number)
- Security Questions (Challenge-Response)
- Answer to a Secret Question
- Possession-based Authentication
- Security Tokens (Hardware/Software)
-
- USB Security Keys (e.g., YubiKey, FIDO)
- Mobile App-based Authenticator (e.g., Google Authenticator, Authy)
-
- Inherence-based Authentication
-
-
-
-
-
-
- Behavioral Biometrics (e.g., typing patterns, gait recognition)
- Multi-Factor Authentication (MFA)
- Combining two or more methods
-
-
-
- Access multiple systems/applications with a single set of credentials
- Risk-based Authentication
-
-
-
-
- Passwordless Authentication
-
-
- Token-based Authentication
-
- SAML (Security Assertion Markup Language)
- OAuth (Open Authorization)
-
- Behavioral Authentication
- Analyzing user behavior patterns
-
-
-
- Context-based Authentication
- Combining contextual data
-
-
-
-
- Session Duration Restrictions
- Geo-fencing Authentication
- Using geographical data for access control
- Two-Factor Authentication (2FA)
-