Two-factor authentication involves the use of multiple, distinct layers of security protecting a device or network.
Users attempting to access a device that is utilizing two-factor authentication must pass two different kinds of "tests" before they can view any actual files or gain access otherwise. Perhaps the most common utilization of two-factor authentication is the use of a "possession factor" in combination with a "knowledge factor." In this case, a user would need to