{"id":670,"date":"2020-12-03T10:27:32","date_gmt":"2020-12-03T10:27:32","guid":{"rendered":"https:\/\/ccbill.com\/kb\/?p=670"},"modified":"2024-09-13T14:57:16","modified_gmt":"2024-09-13T14:57:16","slug":"what-is-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication","title":{"rendered":"What Is 2FA? Two-Factor Authentication Explained"},"content":{"rendered":"\n<p class=\"h3\">Introduction<\/p>\n\n\n\n<p>The online environment and the digital channels used are closely monitored by hackers, data thieves, and other malicious computer pundits. To prevent major data breaches, organizations opt for two-factor identification.<\/p>\n\n\n\n<p>By requiring their clients and employees to enter a password and an additional code or token during transactions, organizations significantly reduce the risk of their computer systems and company data being hacked.<\/p>\n\n\n\n<p>The simple protection mechanism provided by two-factor authentication systems is an invaluable asset for corporations, small and mid-sized businesses, as well as for individuals making payments or receiving money on the Web.<\/p>\n\n\n\n<p><strong>This article explains what two-factor authentication is, how it works, and how it secures online payments. &nbsp;<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png\" alt=\"Man paying using two-factor authentication.\" class=\"wp-image-892\" srcset=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png 800w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained-300x150.png 300w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained-768x384.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Two-Factor Authentication Definition<\/h2>\n\n\n\n<p>Two-factor authentication is a security verification <a href=\"https:\/\/ccbill.com\/blog\/how-does-payment-processing-work\" target=\"_blank\" rel=\"noreferrer noopener\">stage of payment processing<\/a> during which users confirm their identity with something they know (<a rel=\"noreferrer noopener\" href=\"https:\/\/ccbill.com\/kb\/password-policy-best-practices\" target=\"_blank\">a password<\/a>) and something they possess (a code, a one-time password, or a token). Two security layers guard the account for added security.<\/p>\n\n\n\n<p>As opposed to 2FA, single-factor authentication uses just a username\/password combination for securing access. Even though usernames and passwords are still important elements of online authentication, now they\u2019re accompanied by some additional security elements, with which they make two-factor authentication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does Two-Factor Authentication Work<\/h2>\n\n\n\n<p>Two-factor authentication is based on three main principles:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>User\u2019s knowledge<\/strong>. A password or a secret question you need to answer, or various hardware and software tokens (read more about it below).<\/li>\n\n\n\n<li><strong>User\u2019s biometric data<\/strong>. Iris, fingerprint, and face recognition.<\/li>\n\n\n\n<li><strong>Items that a user owns<\/strong>. Hardware and software tokens, computer and mobile devices, bank cards, authentication devices.<\/li>\n<\/ul>\n\n\n\n<p>Users need at least two methods of authentication to verify their identity with 2FA. The two elements are a combination of the above-mentioned verification options<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"800\" height=\"338\" src=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentification-mechanism.png\" alt=\"The principles on which two-factor authentication is based on.\" class=\"wp-image-808\" srcset=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentification-mechanism.png 800w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentification-mechanism-300x127.png 300w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentification-mechanism-768x324.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<p>What\u2019s also important in establishing two-factor authentication to protect online accounts are the sign-in time and the location of the user.<\/p>\n\n\n\n<p>For instance, when you want to sign into your email account from a different device or an unusual location, Google or any other provider asks for an identity check. Software solutions and <a href=\"https:\/\/ccbill.com\/payment-processing\" target=\"_blank\" rel=\"noreferrer noopener\">payment processors<\/a> are implementing these additional factors to increase the level of protection of their clients and reduce unauthorized access to a minimum.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Different Types of Two-Factor Authentication<\/h2>\n\n\n\n<p>We\u2019ve already highlighted that the first element of two-factor authentication is a user password. The second factor in two-factor authentication is a piece of hardware or software tool that is in possession of the user.<\/p>\n\n\n\n<p>Depending on the second verification factor, there are different types of two-factor verification:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hardware Elements in Two-Factor Authentication<\/h3>\n\n\n\n<p>Before apps became so popular, some organizations used key fobs or smart cards as the second element of two-layer authentication. <\/p>\n\n\n\n<p>In fact, some organizations still require their employees carry those hardware items with them when they\u2019re entering their business premises. Today, however, they\u2019re more frequently used as additional features of multi-factor authentication.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Text Messages as the Second Verification Factor<\/h3>\n\n\n\n<p>Banks, online payment processors, and other organizations rely on text messages as the second factor in their authentication process (in addition to passwords). It is the most practical option. <\/p>\n\n\n\n<p>When a user wants to make an online payment, their bank sends them an SMS with a temporary code required to process the payment. There are two verification methods in this authentication, which ensures a high level of security.&nbsp;<\/p>\n\n\n\n<p>Receiving access codes this way increases the risks of exposure to unauthorized access. Even though such codes are valid for only 5 or 10 minutes, this method of two-factor authentication is potentially hazardous due to offline threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Software Tokens for Enhanced Security<\/h3>\n\n\n\n<p>Generating software tokens via special apps is gradually replacing text messages as the second factor in the verification process.<\/p>\n\n\n\n<p>Unlike codes sent to mobile devices as text messages, software tokens don\u2019t include the offline environment; everything is happening online. They\u2019re here to provide users with one-time passwords (OTPs) that are the real second factor in the authentication process.<\/p>\n\n\n\n<p>When a user wants to access their bank or any other account, the system requests a one-time password. This temporary code is generated via a software token app and sent to the user. After that, the user enters it into the required field and gains access to their account. OTPs are usually valid only for thirty seconds or one minute at the most. When used or expired, the token ceases to be valid. As such, it reduces the possibility of unauthorized access or <a href=\"https:\/\/ccbill.com\/blog\/ecommerce-fraud-trends\" target=\"_blank\" rel=\"noreferrer noopener\">data theft<\/a> to a minimum.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Push Notifications and Apps<\/h3>\n\n\n\n<p>It\u2019s common today that organizations opt for two-tier authentication that consists of one software solution on a computer and one app. <\/p>\n\n\n<div class=\"wp-block-image is-style-default\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"800\" height=\"360\" src=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/using-a-verification-code.png\" alt=\"Use of push notifications and verification codes in 2FA.\" class=\"wp-image-814\" srcset=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/using-a-verification-code.png 800w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/using-a-verification-code-300x135.png 300w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/using-a-verification-code-768x346.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n<p>For instance, when someone wants to confirm their access or authorization rights to the software, they receive a notification via a special app to approve access to the software in question. This notification is either in the form of a <a href=\"https:\/\/ccbill.com\/kb\/web-push-notifications-ecommerce\" target=\"_blank\" rel=\"noreferrer noopener\">push notification<\/a> or a PIN-code.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Biometric Elements in the Service of Authentication<\/h3>\n\n\n\n<p>Organizations have started implementing biometric elements as the second or even third factor of the authentication process.<\/p>\n\n\n\n<p>Biometric payment cards are becoming more popular as a payment method. Instead of entering a PIN-code when we\u2019re paying for a purchased item, we\u2019re simply going to scan the tip of our fingers on a fingerprint reader on the bank card. Those cards will come with our fingerprints already integrated into them.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-style-rounded\"><img decoding=\"async\" width=\"800\" height=\"362\" src=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/biometric-authentication.png\" alt=\"Use of biometric authentication as part of multi-factor authentication.\" class=\"wp-image-815\" srcset=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/biometric-authentication.png 800w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/biometric-authentication-300x136.png 300w, https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/biometric-authentication-768x348.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<p>Additional biometric elements include scanning users' iris and faces. Our biometric data used for two or multi-factor identification are supposed to be stored only on your personal devices without being kept in databases. Hence, the risk of data theft is minimal.<\/p>\n\n\n\n<p>ID chips are the next frontier in authentication technology. Instead of using hardware and software tokens, ID chips are inserted directly into the top skin layers. Even though this sounds futuristic now, the procedure is already used by some organizations to ensure secure access to business premises and data<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-css-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\"\/>\n\n\n\n<p><strong>Note:<\/strong> Learn about <a href=\"https:\/\/ccbill.com\/kb\/curl-basic-auth\" target=\"_blank\" rel=\"noreferrer noopener\">curl authentication<\/a>, an authentication method where the server validates the provided credentials against a database of authorized users and serves the resources.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-css-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits of Two Factor Authentication<\/h2>\n\n\n\n<p>Payment organizations and software-as-a-services providers are equally exposed to the risk of human error and brute force attacks. The following benefits of two-factor authentication make such outcomes less probable:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Prevention of data and financial losses. <\/strong>If users\u2019 accounts were protected only with passwords, hackers and data hijackers would have a much easier job of breaking those passwords. Likewise, if we didn\u2019t use two-factor authentication, many users and organizations would experience severe data losses and, consequently, significant financial losses.<\/li>\n\n\n\n<li><strong>Additional exterior security layer<\/strong>. Two or multi-factor authentication shelters online accounts with additional security layers. So, even if an unauthorized party somehow gets into possession of a password, obtaining the second factor is too complex a task for most of them.<\/li>\n\n\n\n<li><strong>Identity and access management<\/strong>. Using another factor in addition to user credentials is a valuable addition to the identity and access management strategy of any organization. If these methods are used by employees working on delicate or confidential data, organizations considerably mitigate the risk of violating their clients\u2019 personal or business data.<\/li>\n<\/ul>\n\n\n\n<p>Therefore, two-factor authentication is a major security mechanism that ensures proper protection of organizations\u2019 privacy and data policies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Two-Factor Authentication and Credit Card Payments<\/h2>\n\n\n\n<p>The aforementioned authentication with SMS-codes is widely used by banks and other organizations. Software developers and compliance specialists working together on providing impenetrable protection solutions for financial institutions still find this the most user-friendly method.<\/p>\n\n\n\n<p>For some clients who are not as tech savvy, <a href=\"https:\/\/ccbill.com\/kb\/credit-card-tokenization\" target=\"_blank\" rel=\"noreferrer noopener\">credit card tokenization<\/a>, additional apps, and OTPs are too complicated. Despite the hazards of a potential unauthorized access, the password-SMS combination is the most practical Venn diagram of available options.<\/p>\n\n\n\n<p>Many banks and organizations operating credit card payments have already embraced push notifications for card payments via mobile phones. When a client wants to transfer funds using their e-banking account, their bank or payment company sends them a push notification to their cell phones, in addition to access credentials. This is both a user-friendly and secure option for clients to experience smooth payments without compromising their online security.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-css-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\"\/>\n\n\n\n<p><strong>Note:<\/strong> Are you <a href=\"https:\/\/ccbill.com\/blog\/start-online-shop\" target=\"_blank\" rel=\"noreferrer noopener\">starting an online shop<\/a>? Learn more about <a rel=\"noreferrer noopener\" href=\"https:\/\/ccbill.com\/kb\/payment-authentication-methods\" target=\"_blank\">Payment Authentication Methods and Tools<\/a>. Payment authentication is crucial for the protection of the buyers' personal information.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-css-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\"\/>\n\n\n\n<p class=\"h3\">Conclusion<\/p>\n\n\n\n<p>When organizations are considering the best options for their two-factor authentication process, they need to factor in their clients\u2019 profiles. Opting for more advanced factors, like software tokens, is a reasonable option if their users are adept at using high-tech solutions.<\/p>\n\n\n\n<p>Likewise, payment organizations with more traditional users are more likely to keep using text messages or simple push notifications to keep their clients protected. Learn more about <a href=\"https:\/\/ccbill.com\/kb\/two-factor-authentication-payments\" target=\"_blank\" rel=\"noreferrer noopener\">2FA in online payments<\/a> and how to protect your customers<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article explains the key features of two-factor authentication and its benefits for business entities and their users. <\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[17,13],"tags":[],"class_list":["post-670","post","type-post","status-publish","format-standard","hentry","category-online-security","category-payment-processing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is 2FA? Two-Factor Authentication Explained | CCBill KB<\/title>\n<meta name=\"description\" content=\"Learn more about two-factor authentication and the benefits that payment companies can provide to their users via this security method.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is 2FA? Two-Factor Authentication Explained | CCBill KB\" \/>\n<meta property=\"og:description\" content=\"Learn more about two-factor authentication and the benefits that payment companies can provide to their users via this security method.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication\" \/>\n<meta property=\"og:site_name\" content=\"CCBill Knowledge Base\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ccbillBIZ\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-03T10:27:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T14:57:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png\" \/>\n<meta name=\"author\" content=\"Vladimir Kaplarevic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CCBillBIZ\" \/>\n<meta name=\"twitter:site\" content=\"@CCBillBIZ\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vladimir Kaplarevic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#article\",\"isPartOf\":{\"@id\":\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication\"},\"author\":{\"name\":\"Vladimir Kaplarevic\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/person\/1f198b1218f6343a2682022ac4395644\"},\"headline\":\"What Is 2FA? Two-Factor Authentication Explained\",\"datePublished\":\"2020-12-03T10:27:32+00:00\",\"dateModified\":\"2024-09-13T14:57:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication\"},\"wordCount\":1461,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#organization\"},\"image\":{\"@id\":\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png\",\"articleSection\":[\"Online Security\",\"Payment Processing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication\",\"url\":\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication\",\"name\":\"What Is 2FA? Two-Factor Authentication Explained | CCBill KB\",\"isPartOf\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png\",\"datePublished\":\"2020-12-03T10:27:32+00:00\",\"dateModified\":\"2024-09-13T14:57:16+00:00\",\"description\":\"Learn more about two-factor authentication and the benefits that payment companies can provide to their users via this security method.\",\"breadcrumb\":{\"@id\":\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#primaryimage\",\"url\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png\",\"contentUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png\",\"width\":800,\"height\":400,\"caption\":\"Man paying using two-factor authentication.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"KB Home\",\"item\":\"https:\/\/ccbill.com\/kb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Online Security\",\"item\":\"https:\/\/ccbill.com\/kb\/category\/online-security\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is 2FA? Two-Factor Authentication Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ccbill.com\/kb\/#website\",\"url\":\"https:\/\/ccbill.com\/kb\/\",\"name\":\"CCBill Knowledge Base\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ccbill.com\/kb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ccbill.com\/kb\/#organization\",\"name\":\"CCBill\",\"url\":\"https:\/\/ccbill.com\/kb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png\",\"contentUrl\":\"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png\",\"width\":160,\"height\":70,\"caption\":\"CCBill\"},\"image\":{\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ccbillBIZ\/\",\"https:\/\/x.com\/CCBillBIZ\",\"https:\/\/www.linkedin.com\/company\/ccbill\",\"https:\/\/www.youtube.com\/c\/CCBillBiz\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/person\/1f198b1218f6343a2682022ac4395644\",\"name\":\"Vladimir Kaplarevic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ccbill.com\/kb\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cc08885e8fec32585bae8a0f5a1aef92f8c8c4fc33692e74e0ec2e63633d2478?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cc08885e8fec32585bae8a0f5a1aef92f8c8c4fc33692e74e0ec2e63633d2478?s=96&d=mm&r=g\",\"caption\":\"Vladimir Kaplarevic\"},\"description\":\"Vladimir is a resident Tech Writer at CCBill. He has more than 8 years of experience in implementing e-commerce and online payment solutions with various global IT services providers. His engaging writing style provides practical advice and aims to spark curiosity for innovative technologies.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is 2FA? Two-Factor Authentication Explained | CCBill KB","description":"Learn more about two-factor authentication and the benefits that payment companies can provide to their users via this security method.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication","og_locale":"en_US","og_type":"article","og_title":"What Is 2FA? Two-Factor Authentication Explained | CCBill KB","og_description":"Learn more about two-factor authentication and the benefits that payment companies can provide to their users via this security method.","og_url":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication","og_site_name":"CCBill Knowledge Base","article_publisher":"https:\/\/www.facebook.com\/ccbillBIZ\/","article_published_time":"2020-12-03T10:27:32+00:00","article_modified_time":"2024-09-13T14:57:16+00:00","og_image":[{"url":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png","type":"","width":"","height":""}],"author":"Vladimir Kaplarevic","twitter_card":"summary_large_image","twitter_creator":"@CCBillBIZ","twitter_site":"@CCBillBIZ","twitter_misc":{"Written by":"Vladimir Kaplarevic","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#article","isPartOf":{"@id":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication"},"author":{"name":"Vladimir Kaplarevic","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/person\/1f198b1218f6343a2682022ac4395644"},"headline":"What Is 2FA? Two-Factor Authentication Explained","datePublished":"2020-12-03T10:27:32+00:00","dateModified":"2024-09-13T14:57:16+00:00","mainEntityOfPage":{"@id":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication"},"wordCount":1461,"commentCount":0,"publisher":{"@id":"https:\/\/ccbill.com\/kb\/#organization"},"image":{"@id":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#primaryimage"},"thumbnailUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png","articleSection":["Online Security","Payment Processing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication","url":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication","name":"What Is 2FA? Two-Factor Authentication Explained | CCBill KB","isPartOf":{"@id":"https:\/\/ccbill.com\/kb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#primaryimage"},"image":{"@id":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#primaryimage"},"thumbnailUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png","datePublished":"2020-12-03T10:27:32+00:00","dateModified":"2024-09-13T14:57:16+00:00","description":"Learn more about two-factor authentication and the benefits that payment companies can provide to their users via this security method.","breadcrumb":{"@id":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#primaryimage","url":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png","contentUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/12\/two-factor-authentication-explained.png","width":800,"height":400,"caption":"Man paying using two-factor authentication."},{"@type":"BreadcrumbList","@id":"https:\/\/ccbill.com\/kb\/what-is-two-factor-authentication#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"KB Home","item":"https:\/\/ccbill.com\/kb\/"},{"@type":"ListItem","position":2,"name":"Online Security","item":"https:\/\/ccbill.com\/kb\/category\/online-security"},{"@type":"ListItem","position":3,"name":"What Is 2FA? Two-Factor Authentication Explained"}]},{"@type":"WebSite","@id":"https:\/\/ccbill.com\/kb\/#website","url":"https:\/\/ccbill.com\/kb\/","name":"CCBill Knowledge Base","description":"","publisher":{"@id":"https:\/\/ccbill.com\/kb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ccbill.com\/kb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ccbill.com\/kb\/#organization","name":"CCBill","url":"https:\/\/ccbill.com\/kb\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/","url":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png","contentUrl":"https:\/\/ccbill.com\/kb\/wp-content\/uploads\/2020\/10\/ccbill-logo.png","width":160,"height":70,"caption":"CCBill"},"image":{"@id":"https:\/\/ccbill.com\/kb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ccbillBIZ\/","https:\/\/x.com\/CCBillBIZ","https:\/\/www.linkedin.com\/company\/ccbill","https:\/\/www.youtube.com\/c\/CCBillBiz"]},{"@type":"Person","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/person\/1f198b1218f6343a2682022ac4395644","name":"Vladimir Kaplarevic","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ccbill.com\/kb\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cc08885e8fec32585bae8a0f5a1aef92f8c8c4fc33692e74e0ec2e63633d2478?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc08885e8fec32585bae8a0f5a1aef92f8c8c4fc33692e74e0ec2e63633d2478?s=96&d=mm&r=g","caption":"Vladimir Kaplarevic"},"description":"Vladimir is a resident Tech Writer at CCBill. He has more than 8 years of experience in implementing e-commerce and online payment solutions with various global IT services providers. His engaging writing style provides practical advice and aims to spark curiosity for innovative technologies."}]}},"_links":{"self":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts\/670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/comments?post=670"}],"version-history":[{"count":50,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts\/670\/revisions"}],"predecessor-version":[{"id":5180,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/posts\/670\/revisions\/5180"}],"wp:attachment":[{"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/media?parent=670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/categories?post=670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ccbill.com\/kb\/wp-json\/wp\/v2\/tags?post=670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}