Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 015

Adaptive Authentication

What is Adaptive Authentication?

Adaptive AuthenticationAn authentication approach that adjusts the strength and number of factors required in real time based on signals such as device, location, and behavior.


Adaptive authentication evaluates contextual signals at sign-in and during a session to vary the credentials required from a user. Inputs typically include device posture, IP reputation, geolocation, network type, time of day, prior behavior, and threat-intelligence feeds. NIST SP 800-63C describes how relying parties can combine assurance levels with such signals, and products from Microsoft Entra Conditional Access, Okta, Ping Identity, and Cisco Duo implement the pattern with policy engines and risk scoring. A low-risk login from a managed device on the home network may pass with a passkey; a higher risk score (new device, anonymizing proxy, unusual time) escalates to MFA, blocks, or quarantine. Adaptive authentication is foundational to zero-trust access strategies.

Examples

  1. 01

    Entra Conditional Access requiring MFA only when the user signs in from outside the corporate network.

  2. 02

    An Okta policy blocking logins from anonymous Tor exit nodes regardless of password correctness.

Frequently asked questions

What is Adaptive Authentication?

An authentication approach that adjusts the strength and number of factors required in real time based on signals such as device, location, and behavior. It belongs to the Identity & Access category of cybersecurity.

What does Adaptive Authentication mean?

An authentication approach that adjusts the strength and number of factors required in real time based on signals such as device, location, and behavior.

How does Adaptive Authentication work?

Adaptive authentication evaluates contextual signals at sign-in and during a session to vary the credentials required from a user. Inputs typically include device posture, IP reputation, geolocation, network type, time of day, prior behavior, and threat-intelligence feeds. NIST SP 800-63C describes how relying parties can combine assurance levels with such signals, and products from Microsoft Entra Conditional Access, Okta, Ping Identity, and Cisco Duo implement the pattern with policy engines and risk scoring. A low-risk login from a managed device on the home network may pass with a passkey; a higher risk score (new device, anonymizing proxy, unusual time) escalates to MFA, blocks, or quarantine. Adaptive authentication is foundational to zero-trust access strategies.

How do you defend against Adaptive Authentication?

Defences for Adaptive Authentication typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Adaptive Authentication?

Common alternative names include: Adaptive access, Context-aware authentication.

Related terms

See also