Authentication Authentication in computer systems uses application protocols to verify that the identity which is requesting access to a computing system is actually who they say they are. Common authentication protocols are OpenID, NTLM, Kerberos, PAP and CHAP. There is a long list of authentication protocols available, each one being applicable to different systems and ... Read more


MFA Multi-factor authentication (MFA) is the process of authenticating an identity into a computing system, application or service by providing at least two of the following authentication factors: The following list provides the most common MFA factor implemented today by security companies:

Strong Authentication

Strong Authentication (SA) Strong authentication assumes the usage of Multi-factor authentication (MFA) as a baseline, but goes beyond that with other authentication means. Strong authentication employs National Institute for Standards and Technology (NIST) assurance level-2 or assurance level-3. More details about strong authentication can be found at: