Two-factor authentication (2FA) is a security mechanism designed to add an extra layer of protection to digital accounts and systems beyond just a username and password. It requires users to provide two different authentication factors to verify their identity. At Sunwave, we require the following two factors to access a user account
Knowledge factors: Something the user knows - your password.
Possession factors: Something the user has, such as a smartphone authenticator app, or a physical token.
By requiring two factors from different categories, 2FA significantly increases the security of an account, as even if one factor is compromised (e.g., a stolen password), the attacker would still need the second factor to gain access.
One common method of implementing 2FA is through the use of authenticator apps on smartphones. At Sunwave, we recommend using the Google Authenticator App, but other Authenticator Apps may also be used. Here's how Authenticator apps work works:
Setup: After enabling 2FA on the software system, the user links their account to an authenticator app on their smartphone. This is often done by scanning a QR code provided by the system.
Generating codes: Once set up, the authenticator app generates temporary, one-time codes based on a shared secret key and the current time. These codes are typically valid for only a short period, often 30 seconds, adding another layer of security.
Authentication process: When the user tries to log in to the software system, in addition to entering their username and password, they are prompted to provide the current code generated by the authenticator app.
Verification: The system verifies the entered code against the one generated by the authenticator app. If the codes match, the user is granted access.
Continuous authentication: Sunwave requires 2FA for each login attempt.
Using an authenticator app for 2FA adds an extra layer of security by requiring not only something the user knows (their password) but also something they have (their smartphone). This significantly reduces the risk of unauthorized access, even if passwords are compromised through data breaches or phishing attacks.
If you have questions about the methods of authentication that can be used to access your Sunwave account, please contact your IT department.