Increasing protection through multi-factor authentication

Access & Identity Management Handbook 2015 Access Control & Identity Management

Anyone who has an ATM card will be familiar with the two-step authentication needed before you can withdraw cash – your bank card and a PIN code. This is known as multi-factor authentication (MFA) and is now common practice in a number of arenas, including acquiring access to facilities and into company IT systems. Does MFA really provide the levels of security we commonly believe it does, or are we still vulnerable?

The types of authentication include PIN codes, passwords, RFID cards, tokens and biometrics (fingerprint, vein, palm, ear, facial recognition and iris recognition). According to Deon van Rensburg from ViRDI Distribution, HID recently released an authentication tool that is similar to the security certificates one sees on online payment sites. These certificates are sent to a user’s phone and are automatically scanned to the reader using near field communication (NFC). Another tool that a number of access control manufacturers are currently investigating is Samsung’s iBeam technology which uses existing secure Bluetooth technology, so no new hardware or electronic development will be required.

Zane Greeff of Elvey says that although tags and PIN codes are the two most common items, because they belong to the same authentication factor (knowledge), they are considered single-factor authentication (SFA). He adds that it is because of their low cost, ease of implementation and familiarity that PIN codes that have remained the most common form of SFA, but tags and PIN codes are not very secure. Multiple challenge-response questions can provide more security, depending on how they are implemented, and standalone biometric verification methods can also provide more secure single-factor authentication.

Alternatives with pros and cons

Brian Wynberger of Reditron says that the issue that arises with PIN codes is that they need to be random enough so that they cannot be easily guessed by a third party, but they also need to be simple enough to remember. Forgetting them often entails a waiting period while the system generates an alternative temporary password which will then allow the user to create a new password.

The problem with tokens or cards, he says, is that users need to be completely educated on their use and they can be easily lost or misplaced. Biometrics offer a more secure alternative, but if there are issues with scanner quality, false negatives or lack of user education on the use of the technology, delays in the flow through of pedestrian traffic will occur.

So is MFA really necessary? In spite of the pros and cons of each of the individual elements (see Table), the more elements that are introduced into the equation, the harder it will be for an intended intruder to gain access into an area. The number of factors used will be dependent on the identified risks and budgetary constraints. In higher risk areas, generally, there will be more factors in the MFA equation.

Best practice

Best practice in even the least risk prone areas is to have a lower level authentication together with one or more biometric authentication modes. Van Rensburg says that ViRDI adopts a multi-modal approach to authentication whereby fingerprint biometrics with live finger detection and vein readers connected to a facial recognition system. He recommends an RFID card used in conjunction with this multi-modal approach plus a PIN code. This he says provides 25 different options for customers.

Greeff says that an attacker may occasionally break an authentication factor in the physical world. A persistent search of the target premises, for example, might yield an employee card or an ID and password in an organisation’s trash, or carelessly discarded storage containing password databases. If additional factors are required for authentication, however, the attacker would face at least one more obstacle.

Wynberger says that single-factor authentication is archaic as new and more ingenious threats and vulnerabilities become prevalent. There is a 30% less probability of attack when one adds a password to an authentication process (say an RFID tag) and the threat is reduced down to 1% if one adds biometrics to the mix. Adding more factors will eventually reduce the risk to close to zero. Percentages mentioned above are merely for illustration purposes.

Speed of entry and exit also needs to be factored into the decision making process and this obviously needs to be balanced against adding additional time-consuming authentication processes to the equation.

Managing authentication

Managing MFA is another area that needs to be considered. Generally, most systems use proprietary software provided by the supplier, with enrolment taking place using a supplier database protocol. Monitoring and reporting can be undertaken through a third-party software supplier but this can cause issues because any reader updates may not be supported by this. Wynberger says that the systems need to be deeply integrated to ensure both the success of the MFA system as well as its longevity of use.

He feels that a building management system (BMS) may dilute the efficacy of an authentication device’s features due to the sheer size of the BMS. In general, he says, a BMS would merely consider what time a person clocks in and out, neglecting other important issues.

Greef says that one may find proprietary software and management in a secure environment that may or may not include building management modules like elevator access and level access, alarm arm and disarm functions. He adds that Impro caters for use of these factors to assist with building management in terms of time triggered events, for example, to arm an alarm at a specific time.

Choosing what factors/elements work for your specific environment and needs depends largely on whether the environment is a secure or high-secure area. Greeff says that Impro provides a selection of input and output modules that may be used to, for example, only provide the presented tag holder with access to a selected floor in a building that he/she has been pre-authorised to enter.

Francois Lottering of Reditron says that there is a diverse array of technologies available on the market which make MFA feasible and sustainable. The secret is choosing the right supplier and the right combination of technologies. He cites exciting products such as the Ievo range of biometric fingerprint readers that can read down to the fourth layer of skin, making them ideal for people who have damaged fingerprints on a dermal level or users wearing latex gloves. Another is the ViRDI AC7000 reader that considers facial recognition, fingerprints, RFID card and PIN in one package.

For more information contact:

Virdi Distribution, +27 (0)11 454 6006, deon@virditech.co.za, www.virditech.co.za

Reditron, 087 802 CCTV (2288), marketing@reditron.co.za, www.reditron.co.za

Elvey Security Technologies, +27 (0) 11 401 6700, info@elvey.co.za, www.elvey.co.za



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.