Cybersecurity Reference > Glossary
What is SMS Authentication?
In SMS authentication, the user provides a code that has been sent to their phone via SMS as proof of their identity.
In theory, SMS authentication provides a second identity factor. While usernames and passwords represent something that only the right user knows, an SMS code delivered to a particular mobile device is evidence of the possession of something—a particular mobile phone—that only the right user should have.
In practice, however, SMS authentication is a poor avenue for this identity factor because the world's SMS systems themselves are tremendously insecure, having been designed and deployed decades ago when cybersecurity was in its infancy and often not considered at all. SMS infrastructure is often authentication-free, and transmits, stores, and receives data in plain text, making it susceptible to interception and eavesdropping. SMS also relies on phone numbers that are themselves generally unsecured and easy to steal, spoof, or port.
For these reasons, most experts do not recommend heavy reliance on SMS codes as an authentication factor, though the ubiquity of mobile phones and users' familiarity with them has led many organizations to deploy SMS authentication anyway as the path of least resistance to 2FA or MFA compliance.
Origin
Early adopters included banks and financial institutions, which saw SMS codes as a straightforward way to protect high-value transactions without requiring customers to carry dedicated hardware tokens. The approach gained momentum quickly because it solved a genuine problem: passwords alone weren't cutting it, and SMS offered a second factor that worked with devices people already carried.
By the mid-2010s, regulatory frameworks began requiring multi-factor authentication for certain industries and use cases. SMS authentication became the default choice for many organizations simply because it was the easiest to implement at scale. The technology itself hadn't changed much since the 1990s, but its application to authentication was relatively new.
What's interesting is that security researchers were raising concerns about SMS vulnerabilities even as adoption was accelerating. The gap between what was convenient and what was secure was already apparent, but convenience often won out in practice.
Why It Matters
The attacks aren't theoretical. SIM swapping—where attackers convince mobile carriers to port a phone number to a new device—has become a common technique for bypassing SMS authentication. Nation-state actors and sophisticated criminal groups regularly exploit SS7 protocol vulnerabilities to intercept SMS messages in transit. Even simpler attacks, like phishing for SMS codes in real-time, prove effective against users who don't understand the threat model.
Yet organizations keep using SMS authentication because alternatives come with their own challenges. Hardware tokens cost money and get lost. Authenticator apps require user education and support overhead. Biometrics raise privacy concerns and don't work for all users. SMS just works, even if it doesn't work securely.
The current situation forces security teams to make uncomfortable trade-offs. Accepting SMS authentication means accepting elevated risk. Rejecting it can mean frustrated users and reduced adoption of multi-factor authentication altogether. Neither choice is ideal, which is why identity and access management strategy matters more than ever.
The Plurilock Advantage
Our approach considers the full context—your threat model, user base, regulatory requirements, and operational constraints. We've helped organizations transition from SMS to more secure methods without the deployment headaches that often derail these projects. Our identity and access management services deliver authentication systems that balance security with usability, protecting your environment without frustrating legitimate users.
.




