{"id":11730,"date":"2021-06-24T16:45:39","date_gmt":"2021-06-24T15:45:39","guid":{"rendered":"https:\/\/www.logonbox.com\/content\/?page_id=11730"},"modified":"2023-09-28T11:43:23","modified_gmt":"2023-09-28T10:43:23","slug":"multi-factor-authentication","status":"publish","type":"page","link":"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/","title":{"rendered":"Two-Factor Authentication (2FA) Support"},"content":{"rendered":"<div class=\"py-5 text-white d-none d-md-block\" style=\"background-color: #000033;\"><div class=\"container py-5\"><div class=\"row\"><div class=\"col-8\"><h1>Two-factor Authentication (2FA)<\/h1><h5 class=\"text-light display-6\">The password alone is not enough to identify a user in the twenty-first century. LogonBox products have extensive support for many types of authentication to ensure that your user&#8217;s identities are confirmed using a mechanism in line with your security policies.<\/h5><\/div><div class=\"col-4 text-right\"><img src=\"\/content\/wp-content\/uploads\/2022\/06\/Cloud-self-service-password-reset.png\" alt=\"Accenture use LogonBox for password resets\" \/><\/div><\/div><\/div><\/div><div class=\"py-5 text-center head-info\"><div class=\"container\"><div class=\"row\"><div class=\"col-12\"><h2>Supported 2FA Factors<\/h2><\/div><div class=\"row text-center mx-auto mt-5 table-responsive\"><table class=\"table borderless\"><tbody><tr><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/duo.png\" alt=\"duo security\" \/><\/td><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/saml.png\" alt=\"saml authentication\" \/><\/td><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/rsa.png\" alt=\"RSA secureID\" \/><\/td><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/yubikey.png\" alt=\"yubikey security\" \/><\/td><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/microsoft-authenticator.png\" alt=\"microsoft-authenticator\" \/><\/td><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/google-auth.png\" alt=\"google authenticator\" \/><\/td><\/tr><tr><td><p class=\"small\">Duo Security<\/p><\/td><td><p class=\"small\">SAML Authentication<\/p><\/td><td><p class=\"small\">RSA SecureID<\/p><\/td><td><p class=\"small\">Yubikey Security<\/p><\/td><td><p class=\"small\">Microsoft Authenticator<\/p><\/td><td><p class=\"small\">Google Authenticator<\/p><\/td><\/tr><tr><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/radius.png\" alt=\"radius authentication\" \/><\/td><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/sms.png\" alt=\"SMS authentication\" \/><\/td><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/logonbox-authenticator.png\" alt=\"LogonBox authenticator\" \/><\/td><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/webauthn-authentication.png\" alt=\"webauthn authentication\" \/><\/td><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/email.png\" alt=\"email authentication\" \/><\/td><td class=\"align-middle\"><img src=\"\/content\/wp-content\/uploads\/2022\/03\/qa-authentication.png\" alt=\"q&#038;a authenticator\" \/><\/td><\/tr><tr><td><p class=\"small\">Radius Authentication<\/p><\/td><td><p class=\"small\">SMS Authentication<\/p><\/td><td><p class=\"small\"><a class=\"underline\" href=\"https:\/\/www.logonbox.com\/content\/logonbox-authenticator\/\">LogonBox Authenticator<\/a><\/p><\/td><td><p class=\"small\">WebAuthn Authentication<\/p><\/td><td><p class=\"small\">Email Authentication<\/p><\/td><td><p class=\"small\">Secure Q&amp;A<\/p><\/td><\/tr><\/tbody><\/table><\/div><\/div><\/div><\/div><div class=\"wrapper\"><div class=\"container\"><div class=\"row text-center\"><div class=\"col-12\"><h5>How does each 2FA option stack up?<\/h5><p>LogonBox product&#8217;s support many authentication types. Here we provide not only the list of supported authentication factors, but provide our opinion on the security, administration and ease of use of each type of authentication.<\/p><\/div><\/div><div class=\"row\"><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\"><a href=\"https:\/\/www.yubico.com\/\">Yubico<\/a><\/h5><h6 class=\"card-subtitle mb-2 text-muted\">USB Hardware Device<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>USB security keys that provide passwordless strong authentication for two-factor and multi-factor authentication.<\/p><p><small><em class=\"text-muted\">&#8220;A very strong second-factor with good compatibility; requires up-front investment and distribution of hardware keys to end-users.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\"><a href=\"https:\/\/webauthn.guide\/\">WebAuthn<\/a><\/h5><h6 class=\"card-subtitle mb-2 text-muted\">Browser + USB Device<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>WebAuthn is a web standard and protocol that enables strong authentication of web applications through the use of public-key cryptography on hardware tokens.<\/p><p><small><em class=\"text-muted\">&#8220;Another very strong second-factor; up-front investment and distribution of hardware required with slightly more complex configuration for the user when compared to direct Yubikey support.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\"><a href=\"\/content\/logonbox-authenticator\/\">LogonBox Authenticator<\/a><\/h5><h6 class=\"card-subtitle mb-2 text-muted\">Mobile Application<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>LogonBox&#8217;s own 2FA solution that provides a secure log in option using modern public-key cryptography and a unique swipe me in action.<\/p><p><small><em class=\"text-muted\">&#8220;Included as part of any LogonBox product; Flexible configuration with an option to require biometric response.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><\/div><div class=\"row\"><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\">Q&amp;A<\/h5><h6 class=\"card-subtitle mb-2 text-muted\">User Secret<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>Setup user authentication by requesting an answer from a set of pre-defined questions that they have previously provided answers to.<\/p><p><small><em class=\"text-muted\">&#8220;A tried and tested solution but not the most secure method available and subject to the usual problems associated with user secrets and passwords.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\">Email OTP<\/h5><h6 class=\"card-subtitle mb-2 text-muted\">Trusted Message<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>Email the user a random one-time password to their primary or secondary email account.<\/p><p><small><em class=\"text-muted\">&#8220;A good compromise between administration and security. Not a suitable solution if the users email account is protected by their Active Directory password.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\">SMS OTP<\/h5><h6 class=\"card-subtitle mb-2 text-muted\">Trusted Message<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>Send an SMS message to the user&#8217;s mobile phone containing a random one-time password.<\/p><p><small><em class=\"text-muted\">&#8220;A great way of delivering one-time passwords but can be subject to mobile network issues.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><\/div><div class=\"row\"><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\"><a href=\"https:\/\/duo.com\/\">Duo<\/a><\/h5><h6 class=\"card-subtitle mb-2 text-muted\">Mobile Application<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>If you have already invested in an existing 2FA solution like Duo, you can uiltise this in any of our authentication flows.<\/p><p><small><em class=\"text-muted\">&#8220;A great solution for when you have already invested time and effort to deploy with other services.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\"><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.authenticator2\">Google Authenticator<\/a><\/h5><h6 class=\"card-subtitle mb-2 text-muted\">Mobile Application<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>The Google Authenticator mobile app uses the TOTP protocol to generate time-based one-time passwords.<\/p><p><small><em class=\"text-muted\">&#8220;Requires no network communication during authentication, just read the current password and enter at the prompt.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\"><a href=\"https:\/\/www.microsoft.com\/en-us\/account\/authenticator#getapp\">Microsoft Authenticator<\/a><\/h5><h6 class=\"card-subtitle mb-2 text-muted\">Mobile Application<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>The Microsoft Authenticator mobile app uses the TOTP protocol to generate time-based one-time passwords.<\/p><p><small><em class=\"text-muted\">&#8220;Another great TOTP solution compatible with Google Authenticator.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><\/div><div class=\"row\"><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\">PIN<\/h5><h6 class=\"card-subtitle mb-2 text-muted\">User Secret<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>A small numeric password of fixed length that the user would present. This would not be typically used on its own, but in-front of another authentication factor.<\/p><p><small><em class=\"text-muted\">&#8220;In the end a PIN is just a numeric password. Easy for users but don&#8217;t use without an additional factor.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\">reCaptcha<\/h5><h6 class=\"card-subtitle mb-2 text-muted\">Mobile Application<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>Google&#8217;s &#8220;are you human&#8221; authenticator which presents a &#8220;I&#8217;m not a Robot&#8221; and other prompts to ensure users are real users and not bots.<\/p><p><small><em class=\"text-muted\">&#8220;Not really an authentication factor, but certainly helps to ensure bots and scripts are not trying to brute force your server.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><div class=\"col-sm-4 my-3\"><div class=\"card h-100\"><div class=\"card-body\"><h5 class=\"card-title\">RADIUS<\/h5><h6 class=\"card-subtitle mb-2 text-muted\">External Authentication<\/h6><div class=\"row\"><div class=\"col-6\"><small>Security<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row\"><div class=\"col-6\"><small>Administration<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><div class=\"row mb-3\"><div class=\"col-6\"><small>Usability<\/small><\/div><div class=\"col-6\"><small><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><i class=\"fa fa-star\"><\/i><\/small><\/div><\/div><p>Authenticate against any server supporting the RADIUS protocol. This legacy protocol lives on and still has some relevance when used correctly.<\/p><p><small><em class=\"text-muted\">&#8220;When used to support real hardware tokens like RSA SecurID it&#8217;s a very secure factor.&#8221;<\/em><\/small><\/p><\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Two-factor Authentication (2FA)The password alone is not enough to identify a user in the twenty-first century. LogonBox products have extensive support for many types of authentication to ensure that your user&#8217;s identities are confirmed using a mechanism in line with your security policies.Supported 2FA FactorsDuo SecuritySAML AuthenticationRSA SecureIDYubikey SecurityMicrosoft AuthenticatorGoogle AuthenticatorRadius AuthenticationSMS AuthenticationLogonBox AuthenticatorWebAuthn AuthenticationEmail [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/empty.php","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Two-Factor Authentication (2FA) Support | LogonBox<\/title>\n<meta name=\"description\" content=\"There are a range of systems which support 2FA and its importance in the digital world. We compare them here to determine which is best for you.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Two-Factor Authentication (2FA) Support | LogonBox\" \/>\n<meta property=\"og:description\" content=\"There are a range of systems which support 2FA and its importance in the digital world. We compare them here to determine which is best for you.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"LogonBox\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-28T10:43:23+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/\",\"url\":\"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/\",\"name\":\"Two-Factor Authentication (2FA) Support | LogonBox\",\"isPartOf\":{\"@id\":\"https:\/\/www.logonbox.com\/content\/#website\"},\"datePublished\":\"2021-06-24T15:45:39+00:00\",\"dateModified\":\"2023-09-28T10:43:23+00:00\",\"description\":\"There are a range of systems which support 2FA and its importance in the digital world. We compare them here to determine which is best for you.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.logonbox.com\/content\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Two-Factor Authentication (2FA) Support\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.logonbox.com\/content\/#website\",\"url\":\"https:\/\/www.logonbox.com\/content\/\",\"name\":\"LogonBox\",\"description\":\"Identity &amp; Authentication Solutions\",\"publisher\":{\"@id\":\"https:\/\/www.logonbox.com\/content\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.logonbox.com\/content\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.logonbox.com\/content\/#organization\",\"name\":\"LogonBox Ltd.\",\"url\":\"https:\/\/www.logonbox.com\/content\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.logonbox.com\/content\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.logonbox.com\/content\/wp-content\/uploads\/2021\/02\/logonbox-logo.gif\",\"contentUrl\":\"https:\/\/www.logonbox.com\/content\/wp-content\/uploads\/2021\/02\/logonbox-logo.gif\",\"width\":1000,\"height\":185,\"caption\":\"LogonBox Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.logonbox.com\/content\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Two-Factor Authentication (2FA) Support | LogonBox","description":"There are a range of systems which support 2FA and its importance in the digital world. We compare them here to determine which is best for you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/","og_locale":"en_GB","og_type":"article","og_title":"Two-Factor Authentication (2FA) Support | LogonBox","og_description":"There are a range of systems which support 2FA and its importance in the digital world. We compare them here to determine which is best for you.","og_url":"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/","og_site_name":"LogonBox","article_modified_time":"2023-09-28T10:43:23+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/","url":"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/","name":"Two-Factor Authentication (2FA) Support | LogonBox","isPartOf":{"@id":"https:\/\/www.logonbox.com\/content\/#website"},"datePublished":"2021-06-24T15:45:39+00:00","dateModified":"2023-09-28T10:43:23+00:00","description":"There are a range of systems which support 2FA and its importance in the digital world. We compare them here to determine which is best for you.","breadcrumb":{"@id":"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.logonbox.com\/content\/two-factor-authentication\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.logonbox.com\/content\/two-factor-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.logonbox.com\/content\/"},{"@type":"ListItem","position":2,"name":"Two-Factor Authentication (2FA) Support"}]},{"@type":"WebSite","@id":"https:\/\/www.logonbox.com\/content\/#website","url":"https:\/\/www.logonbox.com\/content\/","name":"LogonBox","description":"Identity &amp; Authentication Solutions","publisher":{"@id":"https:\/\/www.logonbox.com\/content\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.logonbox.com\/content\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.logonbox.com\/content\/#organization","name":"LogonBox Ltd.","url":"https:\/\/www.logonbox.com\/content\/","sameAs":[],"logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.logonbox.com\/content\/#\/schema\/logo\/image\/","url":"https:\/\/www.logonbox.com\/content\/wp-content\/uploads\/2021\/02\/logonbox-logo.gif","contentUrl":"https:\/\/www.logonbox.com\/content\/wp-content\/uploads\/2021\/02\/logonbox-logo.gif","width":1000,"height":185,"caption":"LogonBox Ltd."},"image":{"@id":"https:\/\/www.logonbox.com\/content\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.logonbox.com\/content\/wp-json\/wp\/v2\/pages\/11730"}],"collection":[{"href":"https:\/\/www.logonbox.com\/content\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.logonbox.com\/content\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.logonbox.com\/content\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.logonbox.com\/content\/wp-json\/wp\/v2\/comments?post=11730"}],"version-history":[{"count":106,"href":"https:\/\/www.logonbox.com\/content\/wp-json\/wp\/v2\/pages\/11730\/revisions"}],"predecessor-version":[{"id":13632,"href":"https:\/\/www.logonbox.com\/content\/wp-json\/wp\/v2\/pages\/11730\/revisions\/13632"}],"wp:attachment":[{"href":"https:\/\/www.logonbox.com\/content\/wp-json\/wp\/v2\/media?parent=11730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}