The list below provided represents various Identity and Access Management (IAM) factors.
When you encounter terms like two-factor or multi-factor authentication, it implies the combination of multiple factors from this list to enhance security.
Common Name | Factor/Concept | Description |
---|---|---|
Knowledge Factor | Something You Know | Authentication based on information only known to the user (e.g., password). |
Owner Factor, Device Factor, or Hard Tokens | Something You Own or Have | Authentication based on possession of a physical item (e.g., a smart card). |
Bio Factor | Something You Are | Authentication based on biometric characteristics (e.g., fingerprint or facial recognition, signature dynamics and others). |
Here's a tabulated representation of the IAM attributes along with their short explanations:
IAM Attribute | Description |
---|---|
Location Factor | Authentication based on the user's physical location (e.g., geofencing). |
Behavioral Characteristics | Authentication based on user behavior, including typing patterns, mouse movements, and more. |
Behavioral Authentication | Authenticating with a device or thing you can exhibit or demonstrate (e.g., a hardware token or a physical smart card). |
Web of Trust Model | A trust model where users rely on the trustworthiness of others within a network or community to authenticate identities. |