Home > Cybersecurity glossary > Authentication application 🟢 Protection

Authentication application 🟢 Protection

A authentication application at cyber security is a software tool designed to verify the identity of a user or device when accessing a protected system, service or resource. It enhances security by adding one or more layers of authentication beyond the traditional password.

 


📌 Main features

 

  1. Generation of unique codes :
    • Product of single-use codes (OTP) or time codes (TOTP) valid for a limited time (e.g. 30 seconds). These codes are synchronised with an authentication server.
  2. Multi-factor authentication (MFA) :
    • Combines several methods to verify identity:
      • What you know (password).
      • What you have (the application installed on a device).
      • What you are (biometrics, if integrated).
  3. Common protocols :
    • TOTP (Time-based One-Time Password).
    • HOTP (HMAC-based One-Time Password): codes triggered by an event (e.g. user click).

👉 Examples of popular applications

  • Google Authenticator
  • Microsoft Authenticator
  • 2FAS
  • Authy
  • Duo Mobile

 


Benefits

 

  • Reducing the risk of phishing/phishing temporary codes cannot be reused.
  • Protection against brute-force attacks codes change frequently.
  • SMS/email independence prevents interception via SIM swapping or mailbox hacking.

 

Use case :

  • Validation of connection to sensitive accounts (bank, email, social networks).
  • Access to professional infrastructures (VPNservers).
Towards the ORSYS Cyber Academy: a free space dedicated to cybersecurity