Cybersecurity Reference > Glossary
What is Identity Factor?
Security professionals group these signals into three types: knowledge factors, which are things only the legitimate user should know, like passwords or PINs; possession factors, which are things only the legitimate user should have, like a phone or security token; and inherence factors, which are things only the legitimate user is, like fingerprints or facial features.
When a system checks only a username and password, it's using single-factor authentication—just one type of signal. Multi-factor authentication, or MFA, requires proof from at least two different categories.
This layered approach matters because any single factor can be compromised. Passwords get stolen in breaches, phones can be lost, and even biometrics can sometimes be spoofed. Combining factors from different categories creates a defense in depth that's considerably harder for attackers to defeat, since they'd need to compromise multiple independent verification methods rather than just one.
Origin
Possession factors gained practical relevance with the spread of hardware tokens like RSA SecurID in the corporate world during the late 1980s and 1990s. Inherence factors, particularly fingerprint scanning, entered consumer awareness through government and law enforcement use before becoming commercially viable.
By the early 2000s, the three-factor model was standard vocabulary in security standards and certifications. The framework has held up remarkably well even as specific technologies have changed—what once meant physical tokens now includes authenticator apps, and what meant fingerprint readers now encompasses facial recognition and behavioral biometrics.
Why It Matters
Organizations face practical tradeoffs when implementing MFA—adding security without creating so much friction that users circumvent controls or productivity suffers. The rise of remote work has intensified this challenge, since traditional possession factors like badge readers don't translate to home offices. Meanwhile, attackers have adapted with techniques like SIM swapping to defeat SMS-based possession factors and sophisticated phishing that tricks users into providing MFA codes in real time.
The factor framework helps security teams think clearly about these tradeoffs and design authentication that's both strong and usable. Emerging approaches like passwordless authentication and continuous authentication are reframing how we apply these factors, but the underlying categories remain central to evaluating authentication strength.
The Plurilock Advantage
We navigate the complexity of possession factor deployment—whether hardware tokens, mobile authenticators, or platform-native solutions—and integrate these with your existing infrastructure.
Our identity and access management services bring real-world experience from complex enterprise deployments, ensuring your authentication controls actually work in practice, not just in theory.
.




