Chapter 1

Understanding authentication

Put simply, user authentication keeps out any bad actors, while building a secure experience for your real users. This not only protects your business from costly fraud, but it also helps build better experience for your legitimate customers. 

In order to determine whether your users are authentic or up to no good, there are a few different authentication methods your business can use. Here’s a closer look at what those authentication factors and methods are.

Authentication factors

Knowledge, or password-based authentication

Knowledge-based authentication has traditionally been the most common form of authentication. It requires an end user to share something only they would know — like a unique username or email address, password or personal identification number (PIN), or an answer to a security question such as “What is your mother’s maiden name?” — in order to access a secured system. 

Usernames and passwords are one of the most common authentication methods for a reason. It’s a quick and easy way for end users to create an account with your brand and access your systems. That said, this ease of use comes with one big trade off: vulnerability. 

Password-based authentication is also the most vulnerable authentication method as it is highly susceptible to hacking. For example, 66% of Americans admit to using the same password for more than one account and 123456 is one of the most common passwords used today. This reality doesn’t exactly inspire confidence and is why many businesses require customers to use another additional form of authentication. 

 

Possession authentication

Possession authentication requires an end user to be in control of a piece of information or a physical device, like a smartphone with an authentication app or a security key that generates a one-time passcode, to verify their identity. There are two types of possession authentication: 

  • Possession: Using a tool like Twilio Verify, your business can quickly confirm user identities via SMS, passkeys, Silent Network Authentication, voice, WhatsApp, time-based one-time passwords, push notifications, silent device approval, and email.

  • Ownership: Identity Match, on the other hand, goes beyond possession to ensure a user is the actual owner of a phone number by matching user-supplied data against authoritative sources. This is the best way to thwart bots and deter false account creations. Email address validation is also a form of identity ownership verification. 

The pros of possession-based user authentication? Physical devices or access information can easily be replaced or deactivated should a user forget or lose them. The cons? This does put the burden of remembering to keep the physical device on their person. Unfortunately, the ever-present threat of loss, theft, or just forgetting to bring them can jeopardize a users’ access and your systems’ security. 

 

Inherence, or biometric authentication

Lastly, biometric factors authenticate a user’s identity based on their distinct biological characteristics, like their retina patterns, iris scans, fingerprints, facial features, or voice. These characteristics are inherently unique to each individual, making them difficult to replicate or fake. 

This authentication method offers both security and convenience for users, as they can authenticate their identity in seconds using a fingerprint or facial scan. Just note that biometric data is considered personally identifiable information (PII), which evokes privacy concerns and legal compliance considerations. Additionally, inherence-based authentication requires your users' devices to be compatible with the required technology. This compatibility factor might restrict its usefulness across various devices or platforms.

High-level overview of authentication factors

What is it?

Pros

Cons

Knowledge-based authentication

Requires a unique username/email address and password/PIN

Easy for users to remember

Most vulnerable to hacking or social engineering

Possession authentication

Requires a user to possess a specific piece of information or a physical device to verify their identity

Can easily be replaced or deactivated if lost

Threat of loss, theft, or forgetting the device

Inherence authentication

Authenticates a user’s identity using unique biological characteristics

High security and convenient for users

Biometric data is PII, which raises privacy concerns and legal compliance considerations

Different methods of verification

Choosing a verification process that's right for your business

Explore the pros and cons to each account verification process and decide which is right for your business.

Different Authentication Methods

Single-factor authentication (SFA)

Single-factor authentication relies on just one set of credentials, typically a username and password. While it’s still a widely used method of authentication, it is considered the weakest in terms of security.

 

Multi-factor authentication (MFA)

Multi-factor authentication takes security a step further by requiring multiple methods of authentication. For example, it might have a user: 

  1. Login using their username and password
  2. Share a one-time passcode (OTP) sent to them via SMS
  3. Verify their identity using a fingerprint scan 

Two-factor authentication (2FA) is the most common form of multi-factor authentication, offering quick identity verification. That said, some methods, like SMS, remain vulnerable to hacking techniques like man-in-the-middle attacks, SIM swaps, or SMS pumping fraud. Having an additional layer of security in addition to SMS, like biometric authentication in our example above, can help improve security, or your business can use a tool like Twilio Verify Fraud Guard to detect and block suspicious messages.

SMS verification using Twilio Verify

Looking to get started with two-factor authentication?

Explore the pros and cons to each account verification process and decide which is right for your business.

What is it?

Example

Pro

Con

Single-factor authentication

Uses one method of authentication

Username and password

Low friction for users

Low security

Multi-factor authentication

Uses more than two methods of authentication

  1. Username and password

  2. One-time passcode from SMS

  3. Fingerprint scan

Multiple layers of  authentication means more security

Added layers of security can frustrate users