When a customer or member wants to transact with your institution, whether it be a remote deposit, a loan payment, an insurance claim or anything else, the first step is authenticating who that person is and whether or not they are an authorized user for that account. The act of physically flashing a driver’s license to a teller/agent has been digitally reduced down to entering a username and password, but we’ve fast become aware that credentials alone are not strong enough to authenticate a customer.
Customer MFA is becoming table stakes across the financial sector, and even helps satisfy regulatory requirements in some parts of the world. For example, PSD2 in the EU and Open Banking in the UK both explicitly require that banks conduct strong customer authentication (SCA) before allowing a customer to use their account through a third party.
Whether motivated by regulation or just good business sense, rather than looking for a point solution, many financial institutions are evaluating MFA in the context of their overall IAM strategy. The vision for the future in an enterprise is to establish a sole digital authentication platform for all customer journeys, including those that require additional security factors. To accomplish that, you need a powerful, flexible standards-based authentication authority architecture that has the capability to enforce MFA only when required and support a broad variety of context and authentication factors.
But what if your organization has already put MFA in place for customers?
MFA probably isn’t news to you. Large enterprises in the financial services industry in particular are among the early enterprise adopters of customer MFA. As a consumer yourself, it’s likely that accessing your own online banking account was one of the first times you were asked for additional security factors during a login experience. Multiple security factors during login are becoming conventional and generally understood by consumers; they expect you as their financial institution to protect access to their money, and having an additional factor is a visible sign that you’re focused on keeping their accounts secure.
SMS and Email Are Not Secure Enough
Many financial institutions that are proactively requesting additional security factors from customers are using a one-time passcode (OTP) sent through SMS or email. And while SMS and email one-time passcodes do a good job of stopping most attacks, they aren’t foolproof—and bad actors have caught up. Codes sent through SMS or email can be intercepted; a recent data breach of 26 million text messages highlights the dangers of relying on SMS, and the fact that email passwords are often reused means this isn’t ideal either.