{"id":52446,"date":"2021-08-10T11:00:00","date_gmt":"2021-08-10T15:00:00","guid":{"rendered":"https:\/\/live-jc-marketing-site.pantheonsite.io\/?p=52446"},"modified":"2024-02-08T11:40:44","modified_gmt":"2024-02-08T16:40:44","slug":"what-is-step-up-authentication-and-where-does-it-come-into-play","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/what-is-step-up-authentication-and-where-does-it-come-into-play","title":{"rendered":"What Is Step-Up Authentication and Where Does It Come Into Play?"},"content":{"rendered":"\n
The online world can be a scary place, and one that offers many opportunities for malicious individuals to compromise your digital security. While passwords are still the most common way to protect digital accounts, the growing number of SaaS-based applications and services means remembering the right password for each one is a daunting task. While users are encouraged to create new passwords for each website they visit, the simple truth is that they often experience password fatigue<\/a> and will reuse an older password for simplicity’s sake.<\/p>\n\n\n\n This introduces a significant risk to your online security.<\/p>\n\n\n\n If an account is ever compromised, criminal hackers will have access to not only the information for that site, but possibly many others for which the victim may have used the same password. The risk for businesses can be even greater and a breach of its online security can be catastrophic. It can mean a loss of customer trust, loss of revenue, and a loss of reputation.<\/p>\n\n\n\n For this reason, many companies now require more than a simple password for access to their online accounts. This is called multi-factor authentication (MFA)<\/a> or Two Factor Authentication (2FA)<\/a>, and it can be an effective way to mitigate the risks associated with online security.<\/p>\n\n\n\n For most individuals, MFA is introduced in the form of a “second factor” that’s used in conjunction with a user’s password. This can be something as simple as a one-time passcode (OTP) sent via email or a text message or something more complex like a biometric identifier<\/a>. Often, a smartphone app is used to deliver a time-based one-time password (TOTP)<\/a> or facilitate a push notification<\/a>.<\/p>\n\n\n\n Whatever option is ultimately chosen, the second factor is used to make sure that the user is who they say they are. If the user’s second factor doesn’t match, then access is denied.<\/p>\n\n\n\n Step-up authentication, as the name suggests, is the process of transitioning from a single authentication factor (such as a password) to multiple authentication factors. This might seem the same as MFA, but how and where step-up authentication is used plays a critical factor.<\/p>\n\n\n\n A step-up authentication process provides a more robust and secure authentication process. While MFA is often used to protect user data, step-up authentication is more often used to protect the business itself.<\/p>\n\n\n\n With step-up authentication, users can use some resources, but when they need to access more sensitive information, they’re prompted for further authorization. This type of authentication tries to find a balance between security and convenience.<\/p>\n\n\n\n You have probably already been exposed to step-authentication in some fashion in your online activities already. However, some easy-to-understand examples of its use are:<\/p>\n\n\n\n With step-up authentication, access to specific resources can be restricted based on the sensitivity of the information.<\/p>\n\n\n\n Let’s explore one of these scenarios in a bit more depth to provide a clearer picture:<\/p>\n\n\n\n Let’s assume that you needed to do some banking. You log into your bank on your PC and you’re prompted for a username and password. If this is a new computer that you are logging in from, you will often be asked to verify your identity further with a security passphrase that you created when you opened the account. Common passphrases are “mother’s family name\u201d or “name of your first pet” or something similar. Alternatively, you could receive an SMS with a specific code. These are both examples of MFA.<\/p>\n\n\n\n While you’re logging into the account, you’ll probably get a prompt to make sure that you don’t have to enter the passphrase again as long as you continue to use the same browser. In this case, MFA is also accounting for your location and IP address to help you save a step for the future.<\/p>\n\n\n\n Now, while you might be logged in and authenticated, let’s assume that you want to change your password. You go to the account settings page and choose the change password option. At this stage, it’s likely that you’ll be prompted to reauthenticate, respond to a reCAPTCHA prompt, or more. This is an example of step-up authentication in action.<\/p>\n\n\n\n In this case, the bank tries to provide you with additional security against the potential threat that someone else has maliciously accessed your computer or otherwise gained access to your account (or a robot is trying to initiate a password change). By forcing you to reauthenticate, they are ensuring once again that it is you making the change and that you have all of the necessary information to validate your identity.<\/p>\n\n\n\n When comparing authentication methods, step-up, adaptive, and MFA are often used interchangeably, but there are some very important distinctions that need to be understood.<\/p>\n\n\n\n MFA can be considered the parent, as both step-up and adaptive authentication systems utilize features from MFA. MFA is the overarching technology that requires users to submit multiple authentication factors during an access transaction in order to validate their identity.<\/p>\n\n\n\n Step-up authentication adds additional authentication requirements based on the resources being accessed within an application or service. Adaptive authentication, on the other hand, looks at a user’s risk profile and makes a determination as to whether or not additional authentication is required.<\/p>\n\n\n\n To determine risk, adaptive authentication tools consider a user’s physical location in comparison to their IP address, as well as records of previous malicious attempts from that IP address. In addition to location, job functions are also a consideration for assessing risk as well as a variety of other factors.<\/p>\n\n\n\n Protecting business resources and user information is critical at all times. However, employees must also be able to access the information and systems they need to do their jobs. To navigate this dichotomy, step-up authentication is ideal.<\/p>\n\n\n\n With step-up authentication, it’s possible to create more dynamic controls that protect sensitive data or systems within business applications or environments through real-time validation rather than simply through static role-based access. When combined with security principles like Zero Trust security and least privilege, step-up authentication can bridge the gap between security and accessibility. <\/p>\n\n\n\n These different levels of authentication are more user-friendly as they limit the hoops employees need to go through to access less sensitive information, while still protecting the organization and its data should an account be compromised.<\/p>\n\n\n\n Though the implementation of step-up authentication is unique for each situation, the JumpCloud Directory Platform<\/a> provides multiple ways to deliver step-up authentication throughout the organization. By leveraging multi-factor authentication across multiple resources like applications, devices, networks, infrastructure, and more and developing conditional access policies to govern secure access based on identity, device, and network, JumpCloud makes it easy to secure access without slowing end users down. <\/p>\n\n\n\nHow Multi-Factor Authentication Helps<\/h2>\n\n\n\n
Step-Up Authentication vs Multi-Factor Authentication<\/h2>\n\n\n\n
Step-Up Authentication Examples<\/h2>\n\n\n\n
\n
How Step-Up Authentication Compares to Adaptive Authentication<\/h2>\n\n\n\n
Using Step-Up Authentication<\/h2>\n\n\n\n
Step-Up Authentication and JumpCloud<\/h2>\n\n\n\n