• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Company · Blog · Newsletter · Events · Partner Program

Downloads      Support      Security     Admin Login
Rublon

Rublon

Secure Remote Access

  • Product
    • Regulatory Compliance
    • Use Cases
    • Rublon Reviews
    • Authentication Basics
    • What is MFA?
    • Importance of MFA
    • User Experience
    • Authentication Methods
    • Rublon Authenticator
    • Remembered Devices
    • Logs
    • Single Sign-On
    • Access Policies
    • Directory Sync
  • Solutions
    • MFA for Remote Desktop
    • MFA for Remote Access Software
    • MFA for Windows Logon
    • MFA for Linux
    • MFA for Active Directory
    • MFA for LDAP
    • MFA for RADIUS
    • MFA for SAML
    • MFA for RemoteApp
    • MFA for Workgroup Accounts
    • MFA for Entra ID
  • Customers
  • Industries
    • Financial Services
    • Investment Funds
    • Retail
    • Technology
    • Healthcare
    • Legal
    • Education
    • Government
  • Pricing
  • Docs
Contact Sales Free Trial

IRS Requirements on MFA

January 5, 2022 By Rublon Authors

Last updated on March 27, 2024

Last week, we talked about MFA for Accounting Firms/Tax Professionals. In this follow-up article, we check what are the mandatory Internal Revenue Service (IRS) requirements on MFA, as described in Publication 1075, Tax Information Security Guidelines for Federal, State and Local Agencies and Multi-factor Authentication Implementation. Read on to learn what to look for in a security service provider offering a Multi-Factor Authentication (MFA) solution.

General MFA Requirements

The general IRS requirements on MFA are as follows:

  • The security system must be able to uniquely identify and authenticate agency users.
  • The security system must implement Multi-Factor Authentication (MFA) that combines at least two authentication factors out of these three: something you know, something you have, something you are. Doubled factors (e.g., two passwords) are counted as one.
  • The security system must allow the implementation of Multi-Factor Authentication (MFA) for all remote network access to privileged and non-privileged accounts.
  • The security system must allow the implementation of MFA such that one of the authentication factors is provided by a device separate from the system gaining access.

Something You Know Requirements

The Knowledge Factor based on something you know is one of the three authentication factors that an MFA system may use to uniquely identify and authenticate users. Passwords and PINs are the most popular forms of something you know.

To comply with Pub. 1075, passwords must meet the following requirements:

  • At least 8 characters long
  • At least one numeric and one special character
  • At least one uppercase letter and one lowercase letter

In addition to that, the following password policies must be enforced:

  • Password minimum lifetime restriction must be at least one day
  • Non-privileged account passwords must be changed at least every 90 days
  • Privileged account passwords must be changed at least every 60 days
  • Passwords cannot be reused for at least 24 generations

Something You Have Requirements

The Possession Factor based on something you have is one of the three authentication factors that an MFA system may use to uniquely identify and authenticate users. Smartphones, SIM cards, and WebAuthn/U2F Security Key are forms of something you have.

The IRS takes its Possession Factor requirements from the NIST Electronic Authentication Guidelines, and therefore divides the Possession Factor into two categories: software tokens and hardware tokens. In NIST SP 800-63-3, the word “token” was replaced with the word “authenticator” to avoid confusion with tokens in assertion technologies. Still, the core requirements regarding authenticators remain the same.

An authenticator is a piece of software or hardware that contains a secret (e.g. a private key) that can be used to prove the user is in possession of the authenticator or the device the authenticator is installed on.

Software Authenticator Requirements

A software authenticator is a piece of software installed on a computer or a mobile device that can be used to authenticate the user.

Rublon Authenticator is an example of a software authenticator, as it is a mobile app that users can install on their smartphone and use to verify their identity using several authentication methods, such as Mobile Push, Mobile Passcode (TOTP), and QR Code.

The following software authenticator requirements must be met:

  • Authenticator must be activated using another authentication factor, e.g., password or biometric
  • Activation of the authenticator must occur during each MFA, and the authenticator cannot be activated without manual user input (e.g., providing the password during primary authentication)
  • Authenticator must prevent the possibility of exporting the private encryption keys stored in a local key repository
  • Authenticator must never store unencrypted keys in a plain text form, as it makes it easy for malicious actors to copy the keys
  • Authenticator must distribute the seed only through a confidential channel of communication to avoid duplication attacks
  • Challenges, one-time passwords, and other authentication requests must be active for no more than 2 minutes to prevent sharing, theft, or tampering with the current state of the token.
  • One-time passwords must comply with Pub. 1075, guidelines regarding standard passwords.
  • Audit logs must be captured for both successful and unsuccessful login attempts, including attempts to undergo both primary and secondary authentication; attempts to gain unauthorized access must be recorded
  • Cryptographic modules must meet FIPS 140-2 Level 1, namely require production-grade equipment such as a personal computer and at least one encryption algorithm that has been authorized to use.

In addition to the preceding software authenticator requirements regarding MFA, the latest version of malware prevention software must be used to meet the IRS requirements.

Hardware Authenticator Requirements

A hardware authenticator is a physical token that can be used to authenticate the user.

WebAuthn/U2F security keys (e.g., YubiKey Bio) are an example of hardware authenticators, as they are hardware dongles users plug in to the USB port of their computer to authenticate. Hardware OTP keys are yet another example of a hardware authenticator, although these have been largely pushed out by software authenticators that use the Mobile Passcode (TOTP) method. 

The following hardware authenticators are eligible:

  • Look-Up Secret  – a physical or electronic record, often in the form of a table, that stores a set of secrets a user can use to authenticate. During authentication, the user might be asked to provide a specific value from a subset of the table. Look-Up Secrets are often used as recovery keys.
  • Out-of-Band Secret – an out-of-bound secret sent over a distinct communication channel and then validated using the primary communication channel, e.g., SMS Passcode
  • One-Time Password Device – a hardware device that generates a one-time password every time the user pushes a button located on the dongle. One-Time Password Devices can also be based on time, in which case the new password is generated, for example, every 30 seconds. The cryptographic module that performs authentication must be FIPS 140-2 validated. A FIPS-approved block cipher or hash function must be used to combine a symmetric key stored on a personal hardware device with a nonce. The One-Time Password must have a limited lifetime.
  • Cryptographic Device – a hardware device that physically stores keys and performs all cryptographic operations within the dongle, e.g., FIPS-201 smart card or WebAuthn/U2F Security Key like YubiKey.

Something You Are Requirements

The Inherence Factor based on something you are is one of the three authentication factors that an MFA system may use to uniquely identify and authenticate users.

Fingerprint, iris scan, Face ID, and other biometric data constitute something you are and are therefore allowed as a separate factor to meet the IRS requirements on MFA.

Rublon Can Protect Your Financial Data

Rublon enables a cutting-edge Multi-Factor Authentication (MFA) solution for cloud apps, VPNs, custom SDKs, and more. Rublon is a good choice for any financial service, accounting firm, and tax professional looking for a modern and user-friendly authentication system.

Check Rublon for yourself and start a Free 30-Day Trial Today.

Filed Under: Blog

Try Rublon for Free
Start your 30-day Rublon Trial to secure your employees using multi-factor authentication.
No Credit Card Required


Footer

Product

  • Regulatory Compliance
  • Use Cases
  • Rublon Reviews
  • Authentication Basics
  • What is MFA?
  • Importance of MFA
  • User Experience
  • Authentication Methods
  • Rublon Authenticator
  • Remembered Devices
  • Logs
  • Single Sign-On
  • Access Policies
  • Directory Sync

Solutions

  • MFA for Remote Desktop
  • MFA for Windows Logon
  • MFA for Remote Access Software
  • MFA for Linux
  • MFA for Active Directory
  • MFA for LDAP
  • MFA for RADIUS
  • MFA for SAML
  • MFA for RemoteApp
  • MFA for Workgroup Accounts
  • MFA for Entra ID

Secure Your Entire Infrastructure With Ease!

Experience Rublon MFA
Free for 30 Days!

Free Trial
No Credit Card Required

Need Assistance?

Ready to Buy?

We're Here to Help!

Contact

Industries

  • Financial Services
  • Investment Funds
  • Retail
  • Technology
  • Healthcare
  • Legal
  • Education
  • Government

Documentation

  • 2FA for Windows & RDP
  • 2FA for RDS
  • 2FA for RD Gateway
  • 2FA for RD Web Access
  • 2FA for SSH
  • 2FA for OpenVPN
  • 2FA for SonicWall VPN
  • 2FA for Cisco VPN
  • 2FA for Office 365

Support

  • Knowledge Base
  • FAQ
  • System Status

About

  • About Us
  • Blog
  • Events
  • Co-funded by the European Union
  • Contact Us

  • Facebook
  • GitHub
  • LinkedIn
  • Twitter
  • YouTube

© 2025 Rublon · Imprint · Legal & Privacy · Security

  • English