An authentication method in which a computer user is granted access only after successfully presenting two (2FA) or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something the user and only the user knows), possession (something the user and only the user has), and inherence (something the user and only the user is). Also sometimes referred to interchangeably as Two-factor authentication (2FA).