Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 216

Continuous Authentication

What is Continuous Authentication?

Continuous AuthenticationAn approach that keeps validating a user's identity throughout the session — using behavioral and device signals — rather than authenticating only once at login.


Continuous authentication treats identity assurance as an ongoing process. After the initial sign-in, the system constantly evaluates signals — keystroke dynamics, mouse movement, touch pressure, gait, device posture, network changes, geolocation drift — and updates a confidence score. When the score drops, the session is either downgraded (read-only, prompts for step-up) or terminated. The model is central to zero-trust reference architectures such as NIST SP 800-207, and it underpins Continuous Adaptive Risk and Trust Assessment (CARTA) as defined by Gartner. Vendors like BehavioSec, IBM Trusteer, BioCatch and Microsoft Conditional Access deliver continuous evaluation, including the OpenID Continuous Access Evaluation Profile (CAEP) used to revoke OIDC sessions in near real time when posture changes.

Examples

  1. 01

    A bank app that locks the session when the user's typing rhythm differs from their learned baseline.

  2. 02

    Microsoft Entra Continuous Access Evaluation that revokes a token within seconds when an admin disables the account.

Frequently asked questions

What is Continuous Authentication?

An approach that keeps validating a user's identity throughout the session — using behavioral and device signals — rather than authenticating only once at login. It belongs to the Identity & Access category of cybersecurity.

What does Continuous Authentication mean?

An approach that keeps validating a user's identity throughout the session — using behavioral and device signals — rather than authenticating only once at login.

How does Continuous Authentication work?

Continuous authentication treats identity assurance as an ongoing process. After the initial sign-in, the system constantly evaluates signals — keystroke dynamics, mouse movement, touch pressure, gait, device posture, network changes, geolocation drift — and updates a confidence score. When the score drops, the session is either downgraded (read-only, prompts for step-up) or terminated. The model is central to zero-trust reference architectures such as NIST SP 800-207, and it underpins Continuous Adaptive Risk and Trust Assessment (CARTA) as defined by Gartner. Vendors like BehavioSec, IBM Trusteer, BioCatch and Microsoft Conditional Access deliver continuous evaluation, including the OpenID Continuous Access Evaluation Profile (CAEP) used to revoke OIDC sessions in near real time when posture changes.

How do you defend against Continuous Authentication?

Defences for Continuous Authentication typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Continuous Authentication?

Common alternative names include: Continuous identity verification, Session-long authentication.

Related terms