Welcome to this collection of three articles devoted to an in-depth evaluation of testing techniques that combine multi-factor authentication (MFA) mechanisms. If you happen to work in a regulated entity, notably within the monetary or banking sectors, you could have doubtless confronted the challenges related to testing MFA-protected workflows reminiscent of authentication and monetary transactions. Typically, the widespread resolution is to disable these mechanisms and solely check them sometimes. We’ll see in the course of the coming articles that this may be thought-about a nasty observe.
Writer: Jonathan Bernales
This collection of articles is designed to give you an in depth and sensible understanding of the constraints and finest practices on this space. The collection consists of three articles:
- Introduction (at the moment’s article): Understanding what MFA is, and why it’s turning into increasingly fashionable in your on a regular basis apps.
- Constraints of MFA in Testing and Automation Options (subsequent article): Testing MFA flows slightly than skipping them or disabling safety. We’ll speak about instruments like GetMyMFA, Bitwarden and “plus electronic mail addressing“.
- Additional Exploration (final article): Robotic Course of Automation (RPA) and integration with third social gathering providers for workforce collaboration. We’ll speak about Webhooks and UIPath amongst different issues.
The aim is to give you the required instruments to successfully method MFA in your testing tasks, no matter whether or not you’re working by “guide” processes along with your workforce or implementing front-end or API Finish-To-Finish checks.
1. Context
A. What’s MFA, and What Is It For?
MFA (Multi-Issue Authentication) or 2FA (Two-Issue Authentication) is a safety methodology requiring customers to show their identification by a number of types of verification earlier than granting entry to a system or utility. Customers typically show their identification with one thing solely they know (i.e. a password). In contrast to single-password authentication, MFA combines two or extra impartial verification components: one thing the consumer is aware of (password), one thing the consumer possesses (e.g. cellphone, sensible card), and one thing the consumer is (e.g. fingerprint, facial recognition).
This mix makes it a lot more durable for attackers to compromise an account, as they need to not solely steal a password but in addition acquire a second verification issue. MFA thus considerably enhances entry safety, making password compromises much less crucial. As you’ll be able to think about, that makes it notably tough to automate assaults… or checks (as your automated checks is not going to simply have entry to exterior verification mechanisms).
B. Broadly Utilized in Regulated and Monetary Environments
Safety is a basic pillar, particularly in monetary functions and different regulated environments. Regulators require sturdy safety measures to guard delicate data and forestall fraud. MFA is essential on this context, because it strengthens safety by requiring a number of types of verification earlier than granting entry. This mitigates the influence of account compromises, particularly these involving weak or leaked passwords. Even when these mechanisms are quite common for privileged customers, they’re turning into increasingly widespread. We even see sport suppliers require customers to setup MFA on their accounts:

C. The Impression of MFA Mechanisms in Testing
As dealing with a number of components when performing automation is a ache level, many organizations resolve to go the “fast method” and both disable the verification mechanism or just not automate MFA-protected workflows. That is fairly problematic as MFA-protected workflows are actually essentially the most crucial workflows in your finish customers. Disabling MFA can result in incomplete and unrepresentative checks. We’ll go far more intimately about this in our second article 😉
D. Current Mechanisms (TOTP/SMS/Voice/and so forth.)
Earlier than diving into the specifics of MFA mechanisms, it’s necessary to grasp the obtainable choices and their traits. Every mechanism has its benefits and downsides by way of safety, usability, and implementation prices. As every little thing in tech, deciding on a know-how means making trade-offs. Organizations should choose the mechanism finest suited to their wants and people of their finish customers. Beneath are the commonest MFA mechanisms:
- SMS: SMS is probably going the commonest MFA mechanism. Though user-friendly, it’s thought-about much less safe resulting from vulnerabilities reminiscent of SMS interception assaults. Usually, it includes sending a 6-digit code (a One-Time Password (OTP)) to a cellphone quantity specified by the consumer. If the consumer gives the right code, it then proves that he owns that cellphone quantity and might join.
- E-mail: Much like SMS, electronic mail is a typical and handy methodology. Nonetheless, it shares related vulnerabilities, together with the chance of compromised electronic mail accounts. In contrast to SMS, emails may also ship distinctive login hyperlinks as an alternative of 6-digit codes.
- Voice Name: Much less generally used, voice calls present an fascinating various, particularly in eventualities the place SMS and electronic mail are unreliable. Although much less widespread, they are often helpful in particular conditions. In essence, voice calls serve the identical function as SMS OTP codes.
- Time-Primarily based One-Time Password (TOTP): TOTP is likely one of the most safe MFA mechanisms. It makes use of an algorithm to generate short-term passwords based mostly on the present time. Whereas safer, it’s much less acquainted to the general public, doubtlessly limiting adoption. It’s typically utilized in skilled environments, reminiscent of IT admin accounts or monetary providers like cryptocurrency wallets. I strongly advocate securing your private accounts with this mechanism (Google Authenticator is a pleasant App, though many different exist).
- Fingerprint and face recognition: Evidently, fingerprint and face recognition mechanisms have turn into a very talked-about approach to authenticate. Nonetheless, they typically enable to bypass the password mechanism, subsequently dropping the “multi-factor” profit when getting used on telephones.
- Different Examples
- {Hardware} Safety Keys: Gadgets like YubiKey present a really excessive degree of safety however are hardly ever used. They’re generally utilized by system directors and people with entry to very delicate techniques. You even have Apple’s Passkeys which goal to assist customers authenticate with a fingerprint.
- Non-public Authentication Purposes: Ecosystems like Google’s, which require customers to open YouTube, for instance, to validate a login popup.

2. Corporations Should Select Between Usability and Safety
As you’ll be able to see, corporations aiming to boost consumer safety should provide authentication mechanisms which are each acceptable and comprehensible. Their main viewers is after all not testers however finish customers.
When deciding on MFA mechanisms, corporations should steadiness usability and safety. Safety measures ought to be sturdy sufficient to guard in opposition to threats, however easy sufficient to not discourage customers. For instance, whereas {hardware} safety keys present glorious safety, it’s unrealistic to ask customers to purchase a YubiKey for every account registration. Alternatively, less complicated strategies like SMS, whereas accessible, have been confirmed weak.
Subsequently, we’ll concentrate on the commonest authentication methods-SMS, electronic mail, and TOTP-as these are those testers and automation professionals most steadily encounter. Within the following articles, we’ll discover the best way to check and automate MFA workflows utilizing these mechanisms successfully.
3. Conclusion
Choosing and implementing MFA mechanisms requires a deep understanding of regulatory constraints, current mechanisms, and the trade-offs between safety and value. Organizations will subsequently implement much less safe however extra comprehensible MFA mechanisms to make sure most customers undertake a greater safety posture.
Our subsequent articles will take a deep dive into the constraints and finest practices for integrating MFA testing into automated testing methods.
4. Teaser: What’s developing
As we’ve seen above, MFA will not be a pleasant mechanism with the check automation world. By its nature, MFA processes make it advanced to validate transactions and consumer identification programmatically. We’ll check out how totally different approaches and instruments will help us coexist with this constraint and why it’s a nasty thought to only disable or bypass MFA in check environments.

Concerning the Writer: Jonathan Bernales
I’m the CTO at Germen, an InsurTech firm constructing tech platforms for each company and particular person purchasers. I’m captivated with constructing and utilizing know-how that enables groups to ship high-quality code in advanced environments with out compromising on safety or pace. I’m additionally the founding father of GetMyMFA.