OpenText brings decades of expertise to help you unlock data, connect people and processes, and fuel AI with trust
Unify data seamlessly across your enterprise to eliminate silos, improve collaboration, and reduce risks
Get AI-ready and transform your data into structured, accessible, optimized information
Meet regulatory and compliance requirements and protect your information throughout its lifecycle
OpenText helps people manage content, automate work, use AI, and collaborate to boost productivity
See how thousands of companies around the world are succeeding with innovative solutions from OpenText
Our people are our greatest asset; they are the life of the OpenText brand and values
Learn how we aspire to advance societal goals and accelerate positive change
Find a highly skilled OpenText partner with the right solution to enable digital transformation
Explore scalable and flexible deployment options for global organizations of any size
Local control. Global scale. Trusted AI
Your cloud, your control
Free up resources, optimize performance and rapidly address issues
Run anywhere and scale globally in the public cloud of your choice
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
Predict, act, and win with real-time analytics on a smarter data platform
Connect once, reach anything with a secure B2B integration platform
Reimagine knowledge with AI-ready content management solutions
Supercharge intelligent workspaces with AI to modernize work
Integrated cybersecurity solutions for enterprise protection
Purpose built data protection and security solutions
Reinvent threat hunting to improve security posture with the power of agile AI
Ship better software—faster—with AI-driven DevOps automation, testing, and quality
Reimagine conversations with unforgettable customer experiences
Get the clarity needed to cut the cost and complexity of IT operations
Redefine Tier 1 business support functions with self-service capabilities from private generative AI
Build custom applications using proven OpenText Information Management technology
Build it your way with OpenText Cloud APIs that create the real-time information flows that enable custom applications and workflows
Protect what matters, recover when it counts
Secure information management meets trusted AI
A unified data framework to elevate data and AI trust
A place where you can build, deploy, and iterate on agents in your data's language
A set of tools to help ingest data and automate metadata tagging to fuel AI
A suite of services and APIs that make governance proactive and persistent
Professional services experts who help you on your AI journey
Get greater visibility and sharper insights from AI-driven information management. Ready to see how?
Transform daily work with enterprise content management powered by AI
Cut the cost and complexity of IT service management, AIOps, and observability
AI-powered B2B integration for supply chain success
Drive value, growth, and loyalty with connected customer experiences
Agile development and software delivery? It only seems impossible
Cybersecurity for the Enterprise
Unlock insights with AI data analytics
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
Improve efficiency, security, and customer satisfaction with OpenText
Transform energy and resources operations with cloud, cybersecurity, and AI
Boost customer experience, compliance, and efficiency with AI
Reimagine your mission with government-secure information management
Improve care delivery and patient engagement with AI-powered solutions
Modernize legal teams with automated, AI-powered legal tech solutions
Modernize manufacturing operations and logistics to reduce costs and ensure compliance
Enhance consumer engagement with omnichannel retail solutions and AI
Run processes faster and with less risk
Achieve digital transformation with guidance from certified experts
Modernize your information management with certified experts
Meet business goals with expert guidance, managed services, and more
Turn support into your strategic advantage
Free up your internal teams with expert IT service management
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Modernize your information management with certified experts
Meet business goals with expert guidance, managed services, and more
Turn support into your strategic advantage
Free up your internal teams with expert IT service management
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Find a highly skilled OpenText partner with the right solution to enable digital transformation
OpenText partners with leading cloud infrastructure providers to offer the flexibility to run OpenText solutions anywhere
OpenText partners with top enterprise app providers to unlock unstructured content for better business insights
Discover flexible and innovative offerings designed to add value to OpenText solutions
Discover the resources available to support and grow Partner capabilities
Get expert product and service support to accelerate issue resolution and keep business flows running efficiently
Explore detailed services and consulting presentations, briefs, documentation and other resources

When you access a protected resource, you authenticate against a data store with your credential information. It consists of a claimed identity and a secret associated with it. Traditionally, that's been done with just a simple username and password, which is the most common authentication method today. Unfortunately, username/password authentication has been shown to be quite vulnerable to phishing and credential hacking. Since passwords can be hard to remember, people tend to pick a simple one and reuse it across their various online and cloud services. This means that when a credential is hacked on one service, malevolent outsiders test it across other personal and professional digital services.
Multi-factor authentication (MFA) is designed to protect against these and other kinds of threats by requiring the user to provide two or more methods of verification before they are able to gain access to a specific resource like an application, data storage, or private network.
The term “factor” describes the different authentication types or methods used to verify someone’s claimed identity. The different methods are:
Security and usability requirements dictate the process used to confirm the requester’s identity claim. Multi-factor authentication allows security teams to respond to the context or situation of the requestor (person or programmatic process), removing access being the most common scenario. Beyond determining how many types of authentication should be required, IT also needs to balance the cost of usability requirements with the cost of implementing them.
Single-factor authentication (SFA)
SFA has been and still is the default for securing access to mobile, online, and other secured information and facilities. Because it’s so ubiquitous and inexpensive, the most common type of SFA is username and password. Still, passwordless technologies are being adopted at an increasing rate to avoid threats posed by various phishing attacks. For example, the majority of mobile-based apps allow the use of fingerprint or facial recognition in place of the traditional username and password.
Passwordless options (e.g., FIDO2 and passkeys) are currently available from all major platform vendors including Microsoft, Apple, and Google.
Because they are used to verify identities, authentication tokens need to be protected against outsiders. In addition to strong token security, they are often configured to expire fairly frequently, increasing their refresh rate. While implementing short-lived tokens used underneath the passwordless interface raises security, it doesn’t meet the level offered by two-factor authentication.
Modern passwordless mechanisms like passkeys or WebAuthn are not typically classified as simple SFA—they are stronger forms of authentication that often combine multiple cryptographic assurances (something you have and sometimes something you are). True passwordless can itself be a form of strong multi factor or advanced authentication when implemented correctly.
Two-factor authentication (2FA)
2FA strengthens security by requiring the user to provide a second type (know, have, are) for identity verification. One proof of identity might be a physical token, such as an ID card, and the other is something memorized, like a challenge/response, security code, or password. A second factor significantly raises the bar for malfeasant and other outside actors to successfully breach through security.
Here is a common list of popular authentication methods:
Three-factor authentication (3FA)
This method adds another factor to two-factor for further difficulty in falsifying one claimed identity. A typical scenario might be to add biometrics to an existing username/password plus a proximity card login. Because it adds a notable level of friction, it should be reserved for situations that require a high level of security. Banks may find situations where 3FA makes sense, as would various government agencies. Specific high control areas within a part of an airport or hospital are also areas where security teams have deemed 3FA as necessary. 3FA is uncommon and adaptive MFA (which evaluates context risk) is the prevailing industry direction.Although many organizations view user verification as an afterthought, it’s important to note that Verizon’s annual DBIR consistently shows credential hacking as a top breach strategy. It’s simply a matter of time before virtually every organization suffers an event where they lose sensitive information that results in a tangible financial loss and potential loss of customer trust.
What makes these trends notable is that there has never been a time when multi-factor authentication is as convenient and affordable to implement as it is today. Traditionally, organizations have been limiting their MFA implementations to a small subset of specialized users who work with information that poses a higher level of risk to the business. Cost and usability have often been the limiting factors preventing wider deployments of strong authentication technology. Historically, strong authentication methods were expensive to purchase, deploy (including enrolling the users), and administer. But recently, there has been a sweeping set of changes across industries, within the organizations themselves, their customers (or patients, citizens, partners, etc.), and the technology that they have access to.
While each organization has their own concrete requirements, there are high-level business drivers that are frequently common across them:
MFA is now a baseline requirement in:
IT has access to a few technologies to reduce the friction that MFA can potentially impose on users:
Single sign-on (SSO)
SSO allows users to authenticate to multiple resources from just a single interaction from the user, meaning that users enter a single credential from which the infrastructure beneath it authenticates to each of the protected resources on their behalf during that session. The most secure approach to SSO is for the authentication engine to use a unique set of credentials for each resource that is set up for SSO. This builds up security to a high level because:Low-friction authentication options
While the traditional OTPs/TOTPs will continue to be the most common type of second-factor authentication, there may be other options that make more sense for a situation. Out-of-band push mobile apps offer a low-friction option to OTP because all the user needs to do is hit the accept button. For higher-risk situations, some push apps may be configured to require a fingerprint to verify the person’s identity, as well as a confirmation of information (such as a number presented on the desktop) to further verify that the user possesses both the desktop and smartphone.Facial recognition is quickly becoming the biometric authentication of choice. The low-friction nature of Windows Hello, noting that it gets better over time, offers a convenient user experience. The biggest challenge is that Windows Hello doesn’t work well with various lighting situations. This failure to recognize faces across lighting can be managed with additional facial registrations. More recently, some mobile apps offer the ability to register a person’s iris patterns in their eyes. Used together (facial, fingerprint, iris), biometric authentication options raise the security bar high for an outsider to defeat. Biometric methods are also an excellent option for organizations looking for a low-friction way to protect against phishing attacks.
Voice recognition has gained popularity in the financial services sector. Institutions like it because it’s entirely passive for customers as they speak with a service representative. The representative is notified when the customer’s identity has been verified. They use voice recognition in place of challenge questions with customers who frequently have difficulty remembering the correct responses to them. In this case, security and usability are optimized.
FIDO/FIDO2 are attractive options for when users roam across multiple devices. Part of what makes FIDO an attractive authentication option is its broad vendor support and its focus on usability. FIDO has gained notable traction in universities that deal with a large number of students who use a variety of digital services. FIDO allows the portability of passwordless authentication across different devices and platforms.
The profiling of smartphone gestures is a form of behavioral analytics that analyzes how a person physically interacts with their device. It uses heuristics to track patterns in gestures, producing confidence scores based on the consistency of those patterns. As more data is collected, the system becomes more confident in recognizing the user's unique behavior, increasing the accuracy—or fidelity—of the gesture profile. While not initially strong enough to serve as a primary method of identity verification, gesture profiling can be a useful complementary factor when combined with other authentication methods.
OpenText™ Advanced Authentication is part of our enterprise-grade identity and access management portfolio. It enables flexible deployment of MFA, including:
Whether you're securing internal users, partners, or consumers, OpenText delivers secure, compliant, and scalable authentication at enterprise scale.
Security teams often implement the supporting software that comes with the authentication they are adopting. This seems to work well until different devices are purchased that require a different software implementation, creating yet another silo. In large organizations, it’s possible to have multiple silos of passwordless technologies used for either multi-factor authentication or to satisfy some other authentication requirement. The weakness of this situation is that each authentication silo has its own set of policies. Keeping these multiple policy stores up to date requires higher administrative overhead and introduces the risk of having uneven policies.
OpenText Advanced Authentication is designed to serve even the largest organization’s multi-factor authentication needs. Its standards-based approach provides an open architecture free from the risks of vender lock-in. The framework supports a variety of devices and additional out-of-the box methods but can also be expanded as new technologies are delivered to the market.
Regardless of the platform (web, mobile, client) OpenText Advanced Authentication also provides out-of-the-box support for the most common platforms and applications. Beyond serving as the central policy engine for corporate-wide authentications, OpenText Advanced Authentication also offers a risk-based engine to control when MFA is invoked as well as control which authentication types are offered under different risk levels. Beyond its own built-in engine, OpenText Advanced Authentication integrates with OpenText Access Manager to provide a robust set of single sign-on options and risk metrics that can be used as part of an adaptive access management use case.
Enable passwordless and multifactor authentication for simple, organization-wide protection
Enable single sign-on and access control across mobile, cloud, and legacy platforms
Cloud-native identity security platform