You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/well-architected-framework/docs/docs/secure-systems/identity-access-management/implement-strong-sign-in-workflows.mdx
+23-4Lines changed: 23 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,19 @@ breaches.
12
12
13
13
## What are strong sign-in workflows
14
14
15
-
Strong sign-in workflows involve a combination of techniques and technologies to verify a user's identity before granting access to systems. Strong sign-in workflows typically consist of **something you know** - such as a password, and **something you have** - like a physical key. Strong sign-in workflows include multi-factor authentication (MFA), biometric authentication, and adaptive authentication.
15
+
Strong sign-in workflows involve a combination of techniques and technologies to
16
+
verify a user's identity before granting access to systems. Strong sign-in
17
+
workflows typically consist of **something you know** - such as a password,
18
+
**something you have** - like a hardware token or smart card, and **something
19
+
you are** - such as a fingerprint or facial recognition. Strong sign-in
20
+
workflows include:
21
+
22
+
-**Multi-factor authentication (MFA)**: Combination of one or more sign-in factors
23
+
to verify a user's identity.
24
+
-**Biometric authentication**: Use of unique biological traits, such as
25
+
fingerprints or facial recognition, to verify a user's identity.
26
+
-**Adaptive authentication**: Contextual authentication that adjusts the level
27
+
of verification based on user behavior and risk factors.
@@ -25,7 +37,9 @@ should not have access to. It does not, however, ensure that unauthorized users
25
37
have not improperly gained access to credentials that allow authentication to
26
38
those systems or data.
27
39
28
-
When you implement strong sign-in workflows, you add another layer of security by validating the identity of users before granting access. When you combine strong sign-in workflows with [centralized identity
40
+
When you implement strong sign-in workflows, you add another layer of security
41
+
by validating the identity of users before granting access. When you combine
42
+
strong sign-in workflows with [centralized identity
0 commit comments