Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 48 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Multi-factor authentication (MFA) is an authentication mechanism that requires users to provide two or more independent verification factors from different categories (knowledge, possession, inherence) to prove identity before granting access to systems or resources.
Multi-factor authentication (MFA) represents a security control that strengthens authentication by requiring multiple independent proofs of identity from distinct factor categories. The three canonical factor categories are:
The fundamental security principle underlying MFA is defense in depth through independent failure modes. Each authentication factor represents a separate attack surface that must be compromised independently. An adversary who obtains a password (knowledge factor) still cannot authenticate without also compromising the possession factor (e.g., stealing a hardware token) or inherence factor (e.g., spoofing biometrics).
MFA differs from single-factor authentication by requiring factors from multiple categories. Using two passwords or two security questions does not constitute MFA because both factors belong to the same category (knowledge) and share common vulnerabilities (phishing, social engineering, password reuse).
Multi-factor authentication emerged from military and banking security practices where high-value assets required stronger protection than passwords alone could provide. Early implementations combined physical tokens (possession) with PINs (knowledge) for accessing secure facilities or financial systems.
The widespread adoption of MFA in consumer systems accelerated with:
Hardware Security Modules (HSMs): Store possession factor keys in HSMs or Trusted Execution Environments (TEEs) to prevent extraction. The vLEI governance framework requires approximately 128 bits of cryptographic strength for key generation and storage.
Passphrase-Derived Keys: Use strong key derivation functions (KDF) like Argon2 or scrypt to derive keys from knowledge factors. Ensure sufficient entropy (minimum 128 bits) and appropriate KDF parameters to resist brute-force attacks.
Biometric Templates: Store biometric templates securely and use them to unlock cryptographic keys rather than as direct authentication factors. This prevents biometric replay attacks and protects privacy.
When implementing MFA through multi-sig:
For high-security AIDs:
Enrollment Process:
Recovery Procedures:
Traditional MFA implementations typically rely on centralized authentication servers that validate factors and maintain session state. This creates dependencies on:
KERI's architecture provides foundational capabilities that complement and enhance MFA implementations through cryptographic key management and verifiable data structures. While KERI itself is not an MFA system, it addresses critical security challenges that MFA implementations face.
KERI establishes autonomic identifiers (AIDs) with cryptographic roots-of-trust that eliminate dependence on centralized authentication infrastructure. The Key Event Log (KEL) provides an append-only, verifiable record of key state changes that can be validated independently by any party.
This enables MFA implementations where:
KERI's witness and watcher infrastructure implements threshold structure security principles that align with MFA's defense-in-depth philosophy. As documented in the threshold structure security concept:
"A threshold structure for security allows for weaker key management or execution environment infrastructure individually, but achieve greater overall security by multiplying the number of attack surfaces that an attacker must overcome to compromise a system."
This architectural pattern mirrors MFA's approach of requiring compromise of multiple independent factors. In KERI:
KERI's key management capabilities directly support MFA implementations:
Custodial Key Rotation: KERI's custodial rotation enables splitting signing authority (possession factor) from rotation authority (knowledge factor). A custodial agent can hold signing keys (something you have) while the controller retains exclusive rotation authority through pre-rotated keys protected by a passphrase (something you know).
Delegated Identifiers: KERI's delegation mechanism enables hierarchical key management where:
Multi-Sig Thresholds: KERI supports multi-signature configurations where multiple keys must sign events. This can implement MFA by requiring:
KERI's design philosophy aligns with zero-trust security principles that mandate continuous authentication and authorization. The glossary defines zero trust as operating on "never trust, always verify" principles requiring:
KERI's Key Event Receipt Infrastructure provides the cryptographic foundation for implementing these requirements:
The KERI Request Authentication Method (KRAM) demonstrates how KERI enables non-interactive authentication that can incorporate MFA principles:
KRAM can be enhanced with MFA by:
vLEI Credential Issuance: The GLEIF vLEI ecosystem requires strong authentication for credential issuance. MFA protects:
Agent Authentication: KERIA agents managing AIDs in cloud environments benefit from MFA:
Witness Configuration: Configuring witness pools for high-value AIDs uses MFA:
Enhanced Security: MFA dramatically reduces successful authentication attacks:
Compliance Requirements: Many regulatory frameworks mandate MFA:
Audit Trails: MFA events provide valuable security monitoring:
Usability Friction: MFA introduces additional steps in authentication flows:
Implementation Complexity: MFA systems require careful design:
Cost Considerations: MFA implementations incur costs:
Attack Surface Expansion: MFA introduces new attack vectors:
KERI-based systems can integrate MFA through several patterns:
Key Derivation: Derive cryptographic keys from multiple factors:
key = KDF(passphrase || biometric_template || hardware_token_seed)
Multi-Sig Thresholds: Require signatures from keys protected by different factors:
Witness Diversity: Configure witnesses with different authentication requirements:
Delegated Authority: Separate authentication factors across delegation hierarchy:
Multi-factor authentication represents a fundamental security control that significantly strengthens authentication by requiring multiple independent proofs of identity. While KERI is not itself an MFA system, its cryptographic key management infrastructure, threshold structure security, and verifiable data structures provide powerful primitives for implementing robust MFA solutions.
The alignment between MFA's defense-in-depth philosophy and KERI's threshold structure security creates natural synergies. KERI's witness pools, multi-sig capabilities, and delegated identifiers enable MFA implementations that are cryptographically verifiable, infrastructure-independent, and aligned with zero-trust security principles.
For high-security applications like the vLEI ecosystem, combining KERI's cryptographic guarantees with strong MFA practices provides defense against sophisticated attacks while maintaining the usability and portability that decentralized identity systems require.
NIST 800-63B Alignment:
vLEI Governance Requirements:
Phishing Resistance: Use FIDO2/WebAuthn-compatible hardware tokens that bind authentication to specific origins, preventing phishing attacks.
SIM Swapping Protection: Avoid SMS-based factors for high-security applications. Use hardware tokens or authenticator apps instead.
Social Engineering Defense: Implement rate limiting, anomaly detection, and user education to prevent MFA prompt fatigue attacks.
Biometric Spoofing: Use liveness detection and multi-modal biometrics (e.g., fingerprint + facial recognition) for high-security scenarios.