Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Law Library Homepage About the Law Library Research Services Faculty Students Help Ask a Law Librarian Law Library Home page UNC Libraries Law Library Blog Twitter

Security Tools: Two-Factor Authentication

This guide describes usage of Two Factor Authentication

What Is in This Guide?

YubiKey device

YubiKey autthentication device       photo attribution


Two-factor authentication, often shortened to "2FA," is a subset of multi-factor authentication. You are likely familiar with single-factor authentication, most commonly when you use a password to access an online service. Passwords are often compromised, whether through a data breach or other means discussed in this guide. The goal of multi-factor authentication is to make it more complex to bypass authentication requirements by adding additional steps that require something beyond a password. The three types of factors are something you know - such as a password - something you have - such as your mobile phone or an authentication token - and something you are - a physical trait such as a fingerprint. While the additional factors may be subject to compromise, the increased complexity of bypassing all the factors provides a substantially lower risk of intrusion..

Optional Information Box

Insert content here.