Skip to content

Commit 926a282

Browse files
pankajtaneja5PANKAJ TANEJAPANKAJ TANEJA
authored
Adaptive auth section (#1687)
* Add Adaptive or Risk-Based Authentication section to MFA cheat sheet * removing extra line * Fix markdown lint MD032: add blank line before list --------- Co-authored-by: PANKAJ TANEJA <[email protected]> Co-authored-by: PANKAJ TANEJA <[email protected]>
1 parent 5c89b1b commit 926a282

File tree

1 file changed

+22
-0
lines changed

1 file changed

+22
-0
lines changed

cheatsheets/Multifactor_Authentication_Cheat_Sheet.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -417,6 +417,28 @@ Gait analysis is based on the way the user walks using cameras and sensors. They
417417
- Requires specific hardware to implement.
418418
- Use outside of physical security systems is not widely tested.
419419

420+
## Adaptive or Risk-Based Authentication
421+
422+
Adaptive (or Risk-Based) Authentication adjusts authentication requirements dynamically based on the context of the login attempt. This technique helps improve user experience while strengthening security by applying additional verification steps only when risk is elevated.
423+
424+
Common signals used to determine risk include:
425+
426+
- Geolocation and IP reputation
427+
- Device fingerprinting
428+
- Time of access (e.g., 3 AM login)
429+
- Behavioral biometrics (e.g., typing speed or mouse movements)
430+
- Known compromised credentials
431+
432+
If risk is detected, the system may:
433+
434+
- Prompt for an additional factor (e.g., OTP)
435+
- Enforce re-authentication
436+
- Deny access and trigger alerting or account protection flows
437+
438+
This method is widely used in modern authentication systems to balance usability and security. However, developers must ensure that risk signals cannot be spoofed and that fallback mechanisms are not weaker than the primary MFA methods.
439+
440+
**Example Use Case**: A user logs in from a trusted device in a usual location — no additional prompt is needed. But if they log in from a new country using a Tor exit node, the system requires SMS verification or triggers an account lock until further verification.
441+
420442
## References and Further Reading
421443

422444
- [NIST SP 800-63](https://pages.nist.gov/800-63-3/sp800-63b.html)

0 commit comments

Comments
 (0)