Definition
Adaptive authentication is an authentication type that verifies a user’s identity and authorization level on a network. It relies on factors such as end-user behaviour, device status, and location to identify a user and determine their authorization level.
Adaptive authentication creates unique profiles for each user, including the device used, location, and role. Based on the profiles, the system is able to assess the state of the authentication challenge.
Adaptive Authentication Types
- Email notification: Organizations use email to approve or reject a user’s authentication request. If the system detects suspicious activity, it rejects and counteracts the request.
- SMS notification: Authentication requests are sent via an SMS. This type is commonly used in payment platforms such as credit or debit cards to authorize payments. If the system flags suspicious activity, it declines payment requests and reports to the bank to prevent fraud.
- Blocking access: The system uses risk criteria to evaluate user authentication requests. If the request checks certain risk parameters, the system immediately blocks access.
How Adaptive Authentication Works
If a system detects a malicious adaptive authentication request, it can trigger any of the following based on the defined risk factors.
- Facial detection: The system asks users to take selfies in real time to verify their identity.
- OTP Via SMS: A one-time SMS containing a verification password is sent to the user’s device. The SMS is to be keyed into the system for authentication purposes. However, the technique falls short in terms of encryption.
- OTP via Email: A one-time password is sent to the user via email. The user is then supposed to enter the password to verify their identity.
- Push authentication: The system sends a push notification to the user’s device, requesting them to accept or reject the request.
Based on login attempts and user’s actions, the authorization delivers one of three outcomes:
- Permitted entry
- Access denied
- Cannot provide further details
Adaptive Authentication Deployment Methods
Here are three main ways to implement dynamic verification:
- The system administrator can establish predefined rules that define risk thresholds for different variables, such as data, user role, location, timeframes, etc.
- The algorithm will learn user’s normal behaviours based on their habits. For example, it can be taught behavioural correlation.
- Stable policy with transient and steady elements.
Adaptive Authentication Benefits
- Improved Security: It reinforces security by evaluating risks in real-time and adapting an authentication level to match the hazard.
- User Convenience: Adaptive authentication balances security with user experience by removing unnecessary authentication steps and streamlining the process.
- Risk-Based method: Adaptive authentication analyzes various risk factors and interprets data during authentication, providing a better risk assessment for each attempt.
- Adaptive response: Adaptive authentication systems can change their authentication strategies and requirements to protect against emerging threats.
- Compliance: With the rigorous authentication mechanisms many regulatory standards require to safeguard critical information, adaptive authentication provides organizations with frameworks demonstrating their commitment to data protection.