An authentication workflow defines the sequence and methods used to verify a user's identity before granting access to a system, application, or resource. Here’s a breakdown of key components:

Steps in the Authentication Workflow

An authentication workflow can consist of:

  • Single-step authentication (e.g., just a password or an OTP).

  • Two-step authentication (e.g., password + OTP).
  • Multi-step authentication (e.g., password + OTP + Biometrics).

Authentication Methods per Step

Each step can employ one or more authentication factors:

  • Knowledge-based (Something you know)

    • Passwords, PINs, security questions.

  • Possession-based (Something you have)

    • OTP (SMS, email, authenticator apps, hardware tokens.

  • Inherence-based (Something you are)

    • Biometrics (fingerprint, facial recognition, voice).

  • Behavioral-based (Something you do)

    • Keystroke dynamics, mouse movements.

Common Authentication Workflow Examples

  • Single-Factor Authentication (SFA)

    • Step 1: Enter password.

  • Two-Factor Authentication (2FA)

    • Step 1: Enter password.

    • Step 2: Enter OTP from SMS/Authenticator app.

  • Multi-Factor Authentication (MFA)

    • Step 1: Enter username & password.

    • Step 2: Enter OTP from SMS/Authenticator app

    • Step 3: Scan fingerprint

  • No labels