Learning Library

← Back to Library

Passwordless Multi-Factor Authentication

Key Points

  • The video explains that authentication—the “who are you?” question in IT—relies on three categories of factors: something you know, something you have, and something you are.
  • Passwords or PINs (something you know) are easy to create and change but can be compromised if they’re shared or discovered.
  • Devices such as pre‑registered mobile phones (something you have) provide a one‑time code that only the holder can read, though loss of the device can create access problems.
  • Biometric traits like facial recognition (something you are) are difficult to replicate and require no memorization, offering a strong, user‑friendly factor.
  • Combining two or more of these factors into multi‑factor authentication enables a move toward a password‑less, frictionless yet secure user experience.

Full Transcript

# Passwordless Multi-Factor Authentication **Source:** [https://www.youtube.com/watch?v=L3alw3iXaio](https://www.youtube.com/watch?v=L3alw3iXaio) **Duration:** 00:03:03 ## Summary - The video explains that authentication—the “who are you?” question in IT—relies on three categories of factors: something you know, something you have, and something you are. - Passwords or PINs (something you know) are easy to create and change but can be compromised if they’re shared or discovered. - Devices such as pre‑registered mobile phones (something you have) provide a one‑time code that only the holder can read, though loss of the device can create access problems. - Biometric traits like facial recognition (something you are) are difficult to replicate and require no memorization, offering a strong, user‑friendly factor. - Combining two or more of these factors into multi‑factor authentication enables a move toward a password‑less, frictionless yet secure user experience. ## Sections - [00:00:00](https://www.youtube.com/watch?v=L3alw3iXaio&t=0s) **Understanding Authentication Factors** - The speaker explains how IT systems verify identity through “something you know,” “something you have,” and “something you are,” outlining examples, benefits, and limitations of each method. ## Full Transcript
0:00who are you 0:01i mean really who are you 0:03from an i.t perspective i don't mean in 0:05an existential sense i just mean how 0:08does your system know that you are who 0:10you claim to be 0:11in a previous video i talked about the 0:13forays of identity and access management 0:16and in this video i'm going to focus 0:18specifically 0:19on the second a authentication which is 0:22answering that question who are you 0:24the way we answer that question is based 0:26upon a set of factors one factor might 0:30be based upon something you know 0:33another on something you have 0:37another on something you are 0:39so an example of something you know 0:42might be a password or a pin 0:44and the good thing about that is you can 0:46generate it yourself you can change it 0:48over time the problem with it is 0:51it can be known and reside in more than 0:53one brain at a time 0:55as a result that means someone else 0:57could potentially appear to be you from 0:59the system's perspective if they know 1:02your password so there are limits but 1:04you can see what this is a very common 1:06way of authenticating 1:08another way of authenticating was 1:10something you have and very commonly 1:12these days people will do it with a 1:14mobile phone 1:15they'll pre-register that device with 1:18the system and then a message gets sent 1:20to that pre-registered device that only 1:22you would be able to read if you possess 1:24the phone 1:25so that helps most people if you're like 1:27me are not very far from their mobile 1:29device 1:30and if they lose it they're aware of it 1:32and then they can report it 1:34still some some limitations but there 1:36are definitely definitely advantages to 1:38this and then something you are now this 1:40is something i never forget to take with 1:43me as my face for instance now that's 1:46not always good for everyone else but 1:47it's good for me and i can use my face 1:50as a biometric to unlock my phone and 1:53when i do that that didn't require me to 1:56remember any other things it's not 1:58something that's easily replicatable if 2:00the biometric is good 2:02so these things we call factors of 2:05authentication 2:06these factors 2:08then can be used as single factor 2:11authentication or we can do what's known 2:14as multi-factor authentication where i 2:16take multiples of these at the same time 2:19for instance i send a message to your 2:21phone something you have 2:24and you unlock the phone with your face 2:26print something you are 2:28now i've combined two factors into one 2:31and now i have potentially something 2:32that is stronger from a security 2:34standpoint without all the complexity 2:37and without some of the limitations of a 2:39password if i were to use that so 2:41ultimately i could use this as a way to 2:44get down to 2:45the the nirvana that a lot of people 2:47want and that's a no password a 2:49passwordless frictionless environment 2:51that still preserves security 2:53thanks for watching please remember to 2:55like this video and subscribe to this 2:57channel so we can continue to bring you 2:59content that matters to you