At SI for remote access, we use an app called Duo, it works with your smartphone (iOS or Android).
How Multi-factor Authentication Works
Multi-factor Authentication works under one of the three different methods either something you know (a knowledge factor), something you have (possession factor) and something you are (inherence factor).
Something you know
This authentication method is information that a user must provide to log in, the most common being usernames, passwords, PINs, and answering secret questions. A simple way of understanding of how this provides authentication is that the answer is something that only you and you alone should know, therefore verifying your identity.
Something you have
This authentication method refers to anything a user must have in their possession in order to log in. Such examples are a smartphone, security token, key fob, employee ID card, and a one- time password (OTP).
Something you are
By far the hardest to crack and strongest of the authentication methods something you are is any biological traits that can be used to confirm the user and allow a log in. Biometric authentication is the most commonly used form, and includes methods such as, iris scans, fingerprint scans, retina scans, facial recognition, and voice recognition.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.