Multi-factor authentication (MFA) is a security control that requires users to verify their identity using two or more independent factors before gaining access to an account or system.
‍
The challenge MFA addresses is fundamental: passwords alone are a weak authentication factor. They're stolen in data breaches, guessed through credential stuffing, and surrendered through phishing—often without the account owner realizing it until the damage is done. MFA adds friction at the authentication point by requiring something additional—a one-time code, a hardware token, a biometric—that an attacker who has only the password cannot easily provide.
‍
The core principle is independence. Authentication factors are typically categorized as something you know (password, PIN), something you have (hardware token, mobile device), and something you are (fingerprint, face scan). The value of combining factors comes from their independence: compromising one shouldn't compromise the others.
‍
Not all MFA implementations provide the same level of protection:
MFA governs the authentication event. It says nothing about what happens after the user is authenticated.
‍
In a SaaS-heavy environment, authentication is only one part of the access picture. An employee who authenticates via MFA may have also granted dozens of OAuth applications access to their accounts—access that persists indefinitely and doesn't require re-authentication. Session tokens may be cached across devices and networks. Applications accessed outside SSO have their own credential stores that MFA at the IdP layer doesn't touch.
‍
The result is an environment where the front door is locked and monitored, while multiple side doors remain ungoverned. MFA is foundational, but the organizations treating it as sufficient are leaving significant exposure unaddressed.
‍