{"id":102793,"date":"2025-02-09T12:11:56","date_gmt":"2025-02-09T04:11:56","guid":{"rendered":"https:\/\/version-2.com\/?p=102793"},"modified":"2025-01-28T12:15:37","modified_gmt":"2025-01-28T04:15:37","slug":"multi-factor-authentication-the-ins-and-outs","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/02\/multi-factor-authentication-the-ins-and-outs\/","title":{"rendered":"Multi-factor authentication: the ins and outs"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"102793\" class=\"elementor elementor-102793\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/c1c7d1b44c\/multi-factor0authentication.png\/m\/1080x0\/filters:quality(60):format(avif)\" width=\"1080\" height=\"607\" \/><\/p><div class=\"richtext\"><h2 id=\"what-is-multi-factor-authentication-mfa\" class=\"heading-xl text-primary\"><b>What is multi-factor authentication (MFA)?<\/b><\/h2><p class=\"body-md text-primary\">Multi-factor authentication, also referred to as \u201cmulti-step authentication\u201d by some experts, is an access management component that requires users to provide two or more authentication factors to log in and access an account. Essentially, users must provide extra proof of identity besides their username and password. Think of MFA as an extra lock on your door.<\/p><p class=\"body-md text-primary\">Unfortunately, misconceptions about MFA exist: they\u2019re especially prevalent in the business world and often deter users from using it and taking advantage of its security. Organizations tend to think that mandating multi-factor authentication in the IT infrastructure for the entire company is cumbersome and could be counterproductive.<\/p><p class=\"body-md text-primary\">The reality of the matter is actually the opposite: with today\u2019s security technologies, setting up MFA company-wide is quick and causes practically no interruptions. Once it\u2019s done, the benefits that MFA brings to the table far outweigh any possible inconveniences that a company might face during the implementation.<\/p><h2 id=\"how-does-mfa-work\" class=\"heading-xl text-primary\"><b>How does MFA work?<\/b><\/h2><p class=\"body-md text-primary\">Multi-factor authentication employs various technologies, like one-time passwords, tokens, and biometrics, to authenticate users when they try to access their accounts. First, the user enters their username or email and their password. But besides these credentials, and with MFA switched on, the user is also asked to authenticate their identity using their selected secondary verification method. Once the two factors are authenticated, the user is granted access to their account.<\/p><p class=\"body-md text-primary\">One of the most popular MFA factors is known as <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/otp-totp-hotp\/\" data-ga-slug=\"Link to \/blog\/otp-totp-hotp\/\">one-time passwords (OTPs)<\/a>. They\u2019re security codes that can be used only once to authenticate a login attempt. A one-time password is usually 4\u20138 digits long and can be valid for anywhere between 15 seconds and a few hours. When a user attempts to log in, a one-time password is sent via text message or email for authentication. OTPs can also be generated using an authentication app, like <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/nordpass-authenticator\/\" data-ga-slug=\"Link to \/nordpass-authenticator\/\" data-link-full-refresh=\"true\">NordPass\u2019 built-in Authenticator<\/a>.<\/p><p class=\"body-md text-primary\">As you set up multi-factor authentication, your one-time password will be generated in one of two ways: either as a time-based one-time password (TOTP) or a hash-based one-time password (HOTP). Their core difference is how frequently a new code is generated. An authentication app refreshes a TOTP at a set interval (for example, every 30 seconds), while a HOTP only refreshes upon a new login attempt.<\/p><p class=\"body-md text-primary\">One-time passwords rely on two factors\u2014a seed and a moving factor. The seed is a static secret key that stays on the server side, while the moving factor is affected by the counter, which ensures the periodical generation of new passwords. The process of generating a one-time password is randomized, and the number of OTPs that can be generated is practically limitless.<\/p><p class=\"body-md text-primary\">The process of multi-factor authentication takes 3 steps:<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Registration.<\/b> You create an account on a website or app and, in addition to your login credentials, select a preferred method of additional authentication. You may use your phone number to receive authentication via text messages, get emails with the code, switch on biometrics, or use an authentication app. The exact method may vary depending on the platform\u2019s permissions.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Authentication.<\/b> As you log in to your account, you enter your login credentials first and are then prompted to enter your multi-factor authentication code. Use your selected means of authentication to access and input the code. Some apps allow you to autofill the code so that you don\u2019t lose it before it resets.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\"><b>Access.<\/b> If the one-time code you entered matches the server request, your login attempt is authenticated and you can access your account. If you log out, you must start the process over.<\/p><\/li><\/ul><p><img decoding=\"async\" class=\"\" style=\"color: transparent;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/731x341\/b6c786a40c\/1-inner-how-does-it-work-750x340.svg\" sizes=\"(max-width: 743px) 100vw, 50vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/731x341\/b6c786a40c\/1-inner-how-does-it-work-750x340.svg 256w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/b6c786a40c\/1-inner-how-does-it-work-750x340.svg 360w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/b6c786a40c\/1-inner-how-does-it-work-750x340.svg 384w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/b6c786a40c\/1-inner-how-does-it-work-750x340.svg 430w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/b6c786a40c\/1-inner-how-does-it-work-750x340.svg 640w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/b6c786a40c\/1-inner-how-does-it-work-750x340.svg 750w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/b6c786a40c\/1-inner-how-does-it-work-750x340.svg 828w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/b6c786a40c\/1-inner-how-does-it-work-750x340.svg 1080w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/b6c786a40c\/1-inner-how-does-it-work-750x340.svg 1200w\" alt=\"how does mfa work\" width=\"750\" height=\"301\" data-nimg=\"1\" \/><\/p><h2 id=\"types-of-mfa-factors\" class=\"heading-xl text-primary\"><b>Types of MFA factors<\/b><\/h2><p class=\"body-md text-primary\">Varying from platform to platform, a number of different factors are used to authenticate login attempts. The most common examples include the following.<\/p><h3 id=\"what-you-know-knowledge-factor\" class=\"heading-lg text-primary\"><b>What you know (knowledge factor)<\/b><\/h3><p class=\"body-md text-primary\">The knowledge factor typically consists of a password, PIN, passphrase, or security questions whose answers are known only to the rightful account holder. For the knowledge factor to work correctly, the user must enter the correct information requested by the online application.<\/p><h3 id=\"what-you-have-possession-factor\" class=\"heading-lg text-primary\"><b>What you have (possession factor)<\/b><\/h3><p class=\"body-md text-primary\">Before smartphones existed as MFA devices, people carried tokens to generate an OTP that would be entered as an authentication factor. These days, smartphones are the primary physical tools for generating OTPs, usually via authenticator apps. However, physical security keys are also available as a possession factor, often considered one of the most secure MFA options.<\/p><h3 id=\"what-you-are-inherence-factor\" class=\"heading-lg text-primary\"><b>What you are (inherence factor)<\/b><\/h3><p class=\"body-md text-primary\">Biometric data, such as fingerprints, facial features, retina scans, voice recognition, or other biometric information, can also be used for multi-factor authentication. Biometric authentication is gaining more traction by the day, as this method is frictionless when compared to other types of authentication.<\/p><h3 id=\"where-you-are-location-factor\" class=\"heading-lg text-primary\"><b>Where you are (location factor)<\/b><\/h3><p class=\"body-md text-primary\">Last but not least, location-based authentication checks the user\u2019s IP address and geolocation. Users can whitelist certain geolocations and block others. If the login attempt comes from an unrecognized location, MFA blocks access to the account and vice versa.<\/p><p><img decoding=\"async\" class=\"\" style=\"color: transparent; background-size: cover; background-position: 50% 50%; background-repeat: no-repeat;\" src=\"https:\/\/a.storyblok.com\/f\/157611\/731x341\/07aecbf45f\/inner-types-of-mfa.svg\" sizes=\"(max-width: 743px) 100vw, 50vw\" srcset=\"https:\/\/a.storyblok.com\/f\/157611\/731x341\/07aecbf45f\/inner-types-of-mfa.svg 256w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/07aecbf45f\/inner-types-of-mfa.svg 360w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/07aecbf45f\/inner-types-of-mfa.svg 384w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/07aecbf45f\/inner-types-of-mfa.svg 430w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/07aecbf45f\/inner-types-of-mfa.svg 640w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/07aecbf45f\/inner-types-of-mfa.svg 750w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/07aecbf45f\/inner-types-of-mfa.svg 828w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/07aecbf45f\/inner-types-of-mfa.svg 1080w, https:\/\/a.storyblok.com\/f\/157611\/731x341\/07aecbf45f\/inner-types-of-mfa.svg 1200w\" alt=\"inner types of mfa\" width=\"750\" height=\"340\" data-nimg=\"1\" \/><\/p><h2 id=\"why-is-multi-factor-authentication-important\" class=\"heading-xl text-primary\"><b>Why is multi-factor authentication important?<\/b><\/h2><p class=\"body-md text-primary\">As cybercrime continues to increase in frequency and sophistication, individuals and companies alike look for effective and simple ways to ensure the security of their online accounts. Passwords are no longer enough. In fact, considering how frequently weak passwords are the culprit of breaches and how susceptible to attacks <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/most-common-passwords-list\/\" data-ga-slug=\"Link to \/most-common-passwords-list\/\">the most common passwords in the world<\/a> are, additional security measures are not just a recommendation but a necessity. Multi-factor authentication provides that extra layer of security that can make the difference between a secure account and a hacked one.<\/p><p class=\"body-md text-primary\">When bad actors steal passwords and usernames, they can easily gain unauthorized access to accounts and network systems. But with MFA security in place\u2014whether it\u2019s OTP, biometric authentication, or other means\u2014having correct login credentials alone wouldn\u2019t be enough to get into the account. All of that complicates things for attackers, as they would need access to smartphones or other authentication devices related to the user to execute their scheme successfully.<\/p><p class=\"body-md text-primary\">Given that around <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" data-link-full-refresh=\"true\">68% of data breaches<\/a> are related to human error in one way or another, adding MFA to your accounts can significantly improve your security. According to the <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/www.elastic.co\/resources\/security\/report\/global-threat-report\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/www.elastic.co\/resources\/security\/report\/global-threat-report\" data-link-full-refresh=\"true\">2024 Elastic Global Threat Report<\/a>, brute-force techniques grew by 12%. But that\u2019s not all. Security experts and researchers continue to see an increase in phishing attacks, which are usually at the top of the hacking funnel. As cybercrime continues to rise in prominence, MFA is quickly becoming a critical part of everyone&#8217;s security, whether it&#8217;s an individual or a large organization.<\/p><h2 id=\"what\u2019s-the-difference-between-mfa-and-two-factor-authentication\" class=\"heading-xl text-primary\">What\u2019s the difference between MFA and two-factor authentication?<\/h2><p class=\"body-md text-primary\">As the name suggests, the difference between two-factor authentication (2FA) and multi-factor authentication lies in the number of authentication factors required to authenticate a given user. Two-factor authentication requires exactly two authentication factors, whereas MFA requires two or more factors to work as intended. Essentially, you can think of multi-factor authentication as an umbrella term that includes 2FA as one of the options.<\/p><h2 id=\"multi-factor-authentication-examples\" class=\"heading-xl text-primary\">Multi-factor authentication examples<\/h2><p class=\"body-md text-primary\">As already mentioned, multi-factor authentication involves two or more authentication factors that identify a given user. These factors include static and one-time passwords, PINs, passphrases, tokens, and biometrics like fingerprint recognition and face ID. By combining a range of these factors, you can build authentication sequences with different levels of security\u2014but any combination can be stronger than using a single factor.<\/p><p class=\"body-md text-primary\">Usually, your login credentials\u2014your username, account number, or email address and your password\u2014are the first step in the authentication process. Once you provide this information, your login attempt is validated. However, if your login details are breached, anyone can use them to log in to the account and pretend to be you. There is no way of guaranteeing the person logging in is actually you, unless the platform checks to see if the IP matches your usual one\u2014but this would fall under location authentication.<\/p><p class=\"body-md text-primary\">To truly prove it\u2019s you logging in, you need to get the second factor in place. This can be a single-use code sent to you by text, the one-time password generated by your authentication app, or a pop-up on your phone requesting you to verify your fingerprint. For improved accessibility, you can also receive an automated call that uses text-to-speech to list the numbers of your verification code.<\/p><p class=\"body-md text-primary\">From here, you can take it up a notch and add another authentication method. For example, you can combine the one-time password with a biometric proof of identity. However, the principle of \u201cless is more\u201d still stands true\u2014introducing too many authentication factors may negatively affect the overall user experience, making the process too burdensome. Imagine using a token as your second layer and biometrics as your third. If you forget or lose either of the two, you\u2019re barred from accessing your account.<\/p><h2 id=\"mfa-benefits\" class=\"heading-xl text-primary\">MFA benefits<\/h2><p class=\"body-md text-primary\">We\u2019re now familiar with the technical side of MFA and how it works to support data protection. Let\u2019s take a minute to see the practical benefits of using multi-factor authentication to protect your personal and work-related credentials.<\/p><p class=\"body-md text-primary\">The number one advantage that MFA brings to the table is, naturally, enhanced security. Multi-factor authentication works hand in hand with <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/5-strong-password-ideas\/\" data-ga-slug=\"Link to \/blog\/5-strong-password-ideas\/\">strong passwords<\/a> to ensure more robust account and app security. Switching on MFA makes it harder for bad actors to access accounts or system networks without accessing the authentication device.<\/p><p class=\"body-md text-primary\">While increased security is one of the biggest benefits of multi-factor authentication, it\u2019s far from the only one. MFA can be crucial for regulatory compliance. Many <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/password-policy\/\" data-ga-slug=\"Link to \/blog\/password-policy\/\">cybersecurity policy guidelines<\/a> list it as a necessity to meet appropriate data protection standards. For instance, the <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/www.cisecurity.org\/insights\/white-papers\/cis-password-policy-guide\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/www.cisecurity.org\/insights\/white-papers\/cis-password-policy-guide\" data-link-full-refresh=\"true\">CIS Password Policy Guide<\/a> has different standards for accounts that use a password only and those that have MFA mandated. Compliance adherence allows businesses to build stronger trust with customers as it shows they take precautions against cyber threats.<\/p><p class=\"body-md text-primary\">Of course, it cannot be understated that multi-factor authentication is a user-friendly and convenient solution. It may seem contrary at first, as it does require extra steps than just logging in. However, with features like autofill for one-time passwords or biometric authentication, the MFA process can take as little as a tap on the screen. Furthermore, <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/what-is-a-passkey\/\" data-ga-slug=\"Link to \/blog\/what-is-a-passkey\/\">passkeys<\/a> are a type of multi-factor authentication that reduces login time by eliminating the password step altogether while maintaining a high level of security. They combine biometric verification with cryptographic keys, ensuring no one else can access your accounts without your authentication.<\/p><p class=\"body-md text-primary\">In the long term, setting up multi-factor authentication is a cost-effective strategy for businesses. With the average breach costing small and medium-sized businesses as much as <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener noreferrer\" data-ga-slug=\"Link to https:\/\/www.ibm.com\/reports\/data-breach\" data-link-full-refresh=\"true\">$3.31 million<\/a>, setting up company-wide MFA policies can help protect your organization\u2019s reputation and stop the threats before they get to your doorstep. Thanks to its range, MFA can help future-proof businesses from emerging threats. For instance, users can opt for biometric authentication over one-time passwords and vice versa.<\/p><h2 id=\"what-types-of-multi-factor-authentication-does-nordpass-business-support\" class=\"heading-xl text-primary\">What types of multi-factor authentication does NordPass Business support?<\/h2><p class=\"body-md text-primary\">Multi-factor authentication is tightly knit with password protection and is essential for businesses and individuals alike. So, it\u2019s unsurprising that password managers aim to improve not just your credential storage but the way you handle MFA as well.<\/p><p class=\"body-md text-primary\"><a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/business-password-manager\/\" data-ga-slug=\"Link to \/business-password-manager\/\">NordPass<\/a> is a secure and intuitive password manager that\u2019s purpose-built to facilitate smooth and secure management of passwords, passkeys, credit card details, and other sensitive information. It offers support for 3 types of <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/features\/mfa\/\" data-ga-slug=\"Link to \/features\/mfa\/\" data-link-full-refresh=\"true\">multi-factor authentication<\/a>:<\/p><ul class=\"leading-normal List_list__BljM0\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">An authenticator app<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">A security key<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"body-md text-primary\">Backup codes<\/p><\/li><\/ul><p class=\"body-md text-primary\">NordPass supports major authenticator apps such as Google Authenticator, Microsoft Authenticator, and Authy. However, it makes things easy for you by letting you generate and store your one-time passwords directly in your vault. <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/blog\/nordpass-authenticator-business\/\" data-ga-slug=\"Link to \/blog\/nordpass-authenticator-business\/\">NordPass Authenticator for Business<\/a> allows you to set up two-factor codes alongside your passwords, eliminating the need for third-party authentication apps. You can also stay flexible, as NordPass will autofill your one-time passwords for you, whether you\u2019re on your mobile device or desktop browser.<\/p><p class=\"body-md text-primary\">NordPass comes equipped with other security features that help you optimize your business credential security. With features like <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/features\/password-health-report\/\" data-ga-slug=\"Link to \/features\/password-health-report\/\">Password Health<\/a> and <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/have-i-been-hacked\/\" data-ga-slug=\"Link to \/have-i-been-hacked\/\" data-link-full-refresh=\"true\">Data Breach Scanner<\/a>, you can ensure that all credentials used in your organization are strong and secure. Furthermore, you can set up a centralized Password Policy to enforce compliance with high security standards. <a class=\"cursor-pointer focus-visible transition-colors duration-250 ease-out text-success hover:text-teal-600 active:text-teal-800\" href=\"\/en\/plans\/business\/\" data-ga-slug=\"Link to \/plans\/business\/\">Try NordPass today<\/a> and see for yourself how it can help fortify your corporate security.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>What is multi-factor authentication (MFA)? Multi-factor [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1305,973,1129,61],"tags":[1131,974,1077],"class_list":["post-102793","post","type-post","status-publish","format-standard","hentry","category-1305","category-nord-security","category-nordpass","category-press-release","tag-nordpass","tag-nord-security","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Multi-factor authentication: the ins and outs - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Multi-factor authentication: the ins and outs - Version 2\" \/>\n<meta property=\"og:description\" content=\"What is multi-factor authentication (MFA)? Multi-factor [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-09T04:11:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/c1c7d1b44c\/multi-factor0authentication.png\/m\/1080x0\/filters:quality(60):format(avif)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-multi-factor-authentication\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/multi-factor-authentication-the-ins-and-outs\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Multi-factor authentication: the ins and outs\",\"datePublished\":\"2025-02-09T04:11:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/multi-factor-authentication-the-ins-and-outs\\\/\"},\"wordCount\":2053,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-multi-factor-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/c1c7d1b44c\\\/multi-factor0authentication.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"keywords\":[\"NordPass\",\"Nord Security\",\"2025\"],\"articleSection\":[\"2025\",\"Nord Security\",\"NordPass\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/multi-factor-authentication-the-ins-and-outs\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-multi-factor-authentication\\\/\",\"name\":\"Multi-factor authentication: the ins and outs - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-multi-factor-authentication\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-multi-factor-authentication\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/c1c7d1b44c\\\/multi-factor0authentication.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"datePublished\":\"2025-02-09T04:11:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-multi-factor-authentication\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-multi-factor-authentication\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-multi-factor-authentication\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/c1c7d1b44c\\\/multi-factor0authentication.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1062x597\\\/c1c7d1b44c\\\/multi-factor0authentication.png\\\/m\\\/1080x0\\\/filters:quality(60):format(avif)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-is-multi-factor-authentication\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Multi-factor authentication: the ins and outs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Multi-factor authentication: the ins and outs - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/","og_locale":"en_US","og_type":"article","og_title":"Multi-factor authentication: the ins and outs - Version 2","og_description":"What is multi-factor authentication (MFA)? Multi-factor [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/","og_site_name":"Version 2","article_published_time":"2025-02-09T04:11:56+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/c1c7d1b44c\/multi-factor0authentication.png\/m\/1080x0\/filters:quality(60):format(avif)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/02\/multi-factor-authentication-the-ins-and-outs\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Multi-factor authentication: the ins and outs","datePublished":"2025-02-09T04:11:56+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/02\/multi-factor-authentication-the-ins-and-outs\/"},"wordCount":2053,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/c1c7d1b44c\/multi-factor0authentication.png\/m\/1080x0\/filters:quality(60):format(avif)","keywords":["NordPass","Nord Security","2025"],"articleSection":["2025","Nord Security","NordPass","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/02\/multi-factor-authentication-the-ins-and-outs\/","url":"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/","name":"Multi-factor authentication: the ins and outs - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/c1c7d1b44c\/multi-factor0authentication.png\/m\/1080x0\/filters:quality(60):format(avif)","datePublished":"2025-02-09T04:11:56+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/c1c7d1b44c\/multi-factor0authentication.png\/m\/1080x0\/filters:quality(60):format(avif)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/1062x597\/c1c7d1b44c\/multi-factor0authentication.png\/m\/1080x0\/filters:quality(60):format(avif)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/what-is-multi-factor-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Multi-factor authentication: the ins and outs"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qJX","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=102793"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102793\/revisions"}],"predecessor-version":[{"id":102800,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/102793\/revisions\/102800"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=102793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=102793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=102793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}