Step-up authentication is a login method that aims to strike a balance between strong security and convenience. It requires users to provide stronger proof of their identities, like a fingerprint or a code sent to their phone, when they try to access sensitive information or perform security-critical actions.
This is important for two reasons:
Step-up authentication begins with a standard credential-based login, just like any other authentication method. This allows users to perform routine tasks without additional hassle. However, as soon as the system detects anything unusual or risky, it triggers additional verification steps.
Here’s a typical workflow in more detail:
During the session, if the system identifies a risky activity, like accessing sensitive data, attempting a high-value transaction or deleting a production database, it takes the following steps:
Next, we will compare step-up authentication to two other popular authentication methods: multi-factor authentication (MFA) and adaptive authentication.
Multi-factor authentication or MFA is an authentication mechanism that requires more than just a username and password to confirm the user’s identity. Secondary authentication factors can be:
Even though step-up authentication also prompts the user for additional login factors, it only does so based on risk or activity. Here are some additional differences between the two:
Aspect
MFA
Step-up authentication
Trigger mechanism
Always requires multiple factors, regardless of the risk level
The system analyzes different factors to determine if additional verification is necessary
Use case
Designed for general account security
Focused on securing high-risk actions or sensitive data, without disrupting user experience
User experience
Can feel repetitive as MFA is used at every login
Seamless for low-risk actions; only activates when necessary
Examples
Logging into a cloud account with a password + one-time code
Accessing sensitive data in a production environment
When to use which?
Adaptive authentication is a security approach in which the system adjusts the login requirements based on the context of a login attempt or user activity. It uses data like location, device type, behavior patterns and time of access to gauge risk and adjust the difficulty level of the authentication process.
For example, if a user logs in from a familiar device and location, the system may only ask for a password. But if the same user logs in from a new country and/or at an unusual time, it may dynamically trigger additional login factors, like an OTP or biometric verification.
Here are the differences between adaptive authentication and step-up authentication:
Aspect
Adaptive authentication
Step-up authentication
Trigger mechanism
Considers a wide range of real-time contextual factors at the time of initial login and beyond
Triggers during the session if a high-risk action is detected
User experience
Better, as authorized users may not be prompted for additional factors if the context remains the same
Slightly less optimal, as even authorized users may have to re-authenticate themselves before performing any high-risk action
Use of data
Uses real-time data like IP address, device type and user behavior
Generally focused on predefined triggers (e.g., a transaction threshold)
Flexibility
Highly dynamic and relies on advanced algorithms
More static and rule-based
When to use which?
Here are the pros and cons of step-up authentication:
Pros
Cons