Overview

As cyberattacks become more prevalent, passwords no longer provide sufficient safeguards against hackers. Multi-factor authentication (or MFA) adds an extra layer of protection against cyber threats by requiring users to prove their identity by supplying two pieces of evidence when they log in.

Salesforce supports the following types of verification methods:

Salesforce Authenticator App
This makes MFA easy for users with notifications that show where login attempts are coming from and the option to approve or deny logins.

Third-Party Authenticator Apps 
These apps let users verify their identity with unique temporary codes.

Security Keys
These are small physical devices that are easy to use because there is nothing to install and no codes to enter. This is an excellent option for users who cannot use cell phones. 

Built-In Authenticators
Built-in authenticators verify a user’s identity using a device’s biometric reader, such as a fingerprint, iris, or facial recognition scanner. Or in some cases, built-in authenticators confirm a user via a PIN or password that the user sets up with their device’s operating system.

Email messages, phone calls, and text messages are not supported for Salesforce MFA because of their inherent susceptibility to attacks. 



Verification Methods for Multi-Factor Authentication (Salesforce source article)

The multi-factor authentication (MFA) login process requires users to provide an identity verification method in addition to their username and password. The MFA service provided by Salesforce allows the use of strong verification methods only — that is, methods that provide high assurance that the user is who they say they are. Salesforce products support several types of strong verification methods, including authenticator apps, built-in authenticators, and physical security keys. Here’s an overview to help you identify which options work best for your business and your users.

Important
Important

The MFA functionality provided by Salesforce doesn’t allow the use of security questions or one-time passcodes delivered via email, SMS text messages, or phone calls. This restriction is intentional because of the inherent vulnerabilities with these methods. Email credentials can be compromised and mobile phone numbers can be intercepted via SIM swapping attacks or hacked mobile device accounts.

For users who log in with single sign-on (SSO), your SSO provider’s MFA service may support methods that aren’t discussed here. See the Salesforce Multi-Factor Authentication FAQ for guidance on verification methods that satisfy the MFA requirement.

Let’s look at the benefits and considerations for each type of verification method supported by Salesforce products.

Salesforce Authenticator
Third-Party Authenticator Apps
Security Keys
Built-In Authenticators
A smart and simple mobile app that users can easily connect to their Salesforce accounts.
Apps that generate unique, temporary verification codes based on the OATH TOTP algorithm (specified in RFC 6238).
Physical devices that use public-key cryptography.
Operating system-level authentication that verifies identity with fingerprint, iris, or facial recognition scan, or a PIN or password.

Form Factor:

Mobile app for iOS and Android

Form Factor:

Mobile, desktop, and browser extension apps available for multiple operating systems

Form Factor:

USB, Lightning, and NFC devices that support the WebAuthn and U2F standards

Form Factor:

Available via a device’s built-in authenticator service (for example, Windows Hello, Touch ID, and Face ID)

User Experience:

  • Delivers push notifications to users’ phones for fast access.
  • See real-time details to confirm request validity.
  • Deny fraudulent requests with a tap.
  • Automates authentication from trusted locations
  • Generates TOTP codes that work if connectivity isn’t available.

User Experience:

  • A wide variety of apps, including non-mobile options, to choose from.
  • Codes work if connectivity isn’t available.

User Experience:

  • Fast and easy to use.
  • Recognizes and denies fraudulent requests.
  • A great choice if users need a non-mobile option.
  • Connectivity isn’t required.
  • No batteries needed.

User Experience:

  • Fast and easy to use.
  • No apps required.
  • A great choice if users need a non-mobile option.
  • Strong public-key cryptography that’s unique to the user’s account.

Considerations:

  • Requires a mobile device.

Considerations:

  • Typing errors are possible when manually entering codes.
  • Invalid codes are possible if mobile device clock gets out of sync with Salesforce.

Considerations:

  • Requires browser support (limited for U2F).
  • Users could leave keys unattended or plugged in all the time.
  • Operational overhead for purchasing, stocking, and distributing devices to users.

Considerations:

  • Device, operating system, and browser must support FIDO2 WebAuthn standard.
  • Built-in authenticator service must be enabled and set up before MFA registration.
  • Works only for a single device.
  • Supported scanner required for biometric identification.
Cost: Free
Cost: Free and paid options
Cost: Starts around $20
Cost: Starts around $25 for biometric peripherals, if needed
Learn More
Learn More
Learn More
Learn More
Tip
Tip

For guidance on how users can set up and log in with MFA verification methods, see the MFA help documentation for your product. For example, for products built on the Salesforce Platform, see Help Users Register MFA Verification Methods for Salesforce Orgs.

Encourage all users — especially Salesforce admins — to register multiple verification methods so they can avoid getting locked out of your org. If someone forgets or loses their primary method, they have other options for logging in.

Security keys and built-in authenticators must be enabled for products built on the Salesforce Platform before these options are available to users. See Configure the MFA Verification Methods Available to Your Users for Salesforce Orgs.

Notes: 

If users don’t want to use a mobile authenticator app, consider a TOTP desktop authenticator app or browser extension.

Security keys that use the NFC form factor aren’t supported in products built on the Salesforce Platform.

WebAuthn-compatible security keys aren’t supported in non-Chromium versions of the Edge browser.

For U2F security keys, see Update U2F Security Keys to Support WebAuthn Authentication to ensure they continue to work.

Built-in authenticators are supported in products built on the Salesforce Platform, Heroku, Marketing Cloud Intelligence, MuleSoft Anypoint Platform, and Tableau Cloud.