• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Company · Blog · Newsletter · Events · Partner Program

Downloads      Support      Security     Admin Login
Rublon

Rublon

Secure Remote Access

  • Product
    • Regulatory Compliance
    • Use Cases
    • Rublon Reviews
    • Authentication Basics
    • What is MFA?
    • Importance of MFA
    • User Experience
    • Authentication Methods
    • Rublon Authenticator
    • Remembered Devices
    • Logs
    • Single Sign-On
    • Access Policies
    • Directory Sync
  • Solutions
    • MFA for Remote Desktop
    • MFA for Remote Access Software
    • MFA for Windows Logon
    • MFA for Linux
    • MFA for Active Directory
    • MFA for LDAP
    • MFA for RADIUS
    • MFA for SAML
    • MFA for RemoteApp
    • MFA for Workgroup Accounts
    • MFA for Entra ID
  • Customers
  • Industries
    • Financial Services
    • Investment Funds
    • Retail
    • Technology
    • Healthcare
    • Legal
    • Education
    • Government
    • Utilities
  • Pricing
  • Docs
Contact Sales Free Trial

MFA Bypass: What It Means and Why It Happens

May 26, 2022 By Rublon Authors

Last updated on April 23, 2024

MFA Bypass means authorized or unauthorized bypassing of MFA authentication on a user account. A bypassed user can gain access to an application or website after completing only one step of authentication, which usually equals providing the correct password.

Bypassing can be both intended and unintended. Both administrators and users can choose to bypass MFA for various reasons. Unfortunately, hackers can also try to bypass MFA authentication to hack into accounts and gain unauthorized access to data.

How Does MFA Bypass Work?

MFA Bypass downgrades Multi-Factor Authentication (MFA) to Single-Factor Authentication (SFA).

Multi-Factor Authentication (MFA) involves the user going through two steps:

  • First Authentication Factor: Most often asks users to enter the correct password.
  • Second Authentication Factor: Asks users to demonstrate an extra identity proof, for example, to accept a Mobile Push authentication request.

When MFA is on, a user must complete both factors to gain access. Failure to complete one or more of these factors results in the user getting denied.

Image showing how bypass doesn't require the second authentication factor

However, when a user gets bypassed, MFA does not fire off, and the log-in process falls back to standard password-based authentication. In other words, the user only has to complete the first authentication factor (which usually defaults to a password) while skipping the second authentication factor.

It is important to note that we can only talk about MFA Bypass when a system, application, or website employs a Multi-Factor Authentication solution. If a service does not use MFA at all, and all users can access their accounts after only entering their password, then the system uses Single-Factor Authentication (SFA).

Why Does MFA Bypass Happen?

Here are some of the most common reasons why MFA is bypassed.

1. Remembered Devices

Some websites and applications allow users to temporarily turn off MFA as long as consecutive login attempts happen on the same computer or mobile device. In companies that enabled MFA organization-wide, administrators can decide how long a user’s device will be remembered. When you log in to an application, ask the system to remember you on that device. From now on, all your logins require only a password. After a set time has passed, the system will again start asking you for MFA authentication. Advanced MFA systems like Rublon allow remembering the user on a device, but also give administrators the capability to turn off trusted devices altogether.

2. Security Policies

When Policy-Based Access Control (PBAC) or Adaptive Authentication is enabled, a security system enforces policies. These policies might bypass users who use an IP address within a given range or belong to a given group. Administrators often assign security policies based on perceived security risks associated with each application. MFA Bypass is a common practice for trusted users with little privileges. Nevertheless, you should bypass users with caution. MFA is the strongest wall of defense against hackers. Removing it significantly decreases the safety of your users and the overall safeguards of your company.

3. MFA Is Off

From the user’s point of view, it might be hard to tell whether MFA has been bypassed or if it is off altogether. Indeed, a good MFA solution should bypass the user but still perform necessary background security control checks. Still, administrators should be able to look up the authentication logs with clear information on whether a given user has been bypassed. Authentication logs provide transparency and clearly inform where and how your users authenticate into protected applications.

4. Enrollment Settings

User enrollment is of paramount importance to your organization’s security. One of several possible enrollment options some MFA solutions provide is to bypass all unknown users and allow them to sign in to your applications and services without undergoing MFA. Although good for testing purposes and comfortable for administrators, who do not have to accept users manually or investigate why the user has been denied, bypassing unknown users comes with a major security risk all administrators should be aware of before enabling this option. It effectively enforces MFA on all your known users while letting all unknown actors right in. The unknown actor only has to know the password to gain access.

5. Malicious Activity

Although most of the time bypassing has nothing to do with nefarious or malicious activity, the harsh reality of cyberattacks is that hackers often try to turn off MFA instead of compromising it. Should a hacker succeed in disabling MFA protection, they only have to break a password to gain access to an account. We recommend you use the most secure authentication methods:

  1. WebAuthn/U2F Security Key
  2. Mobile Push with additional biometric lock enabled on your phone

Even though even the most secure MFA cannot completely eliminate the likelihood of a human error, social engineering is much less successful when people use strong authentication methods.

Why Does Rublon Bypass MFA?

Using Rublon and would like to know why you or your users are getting bypassed? Here are the most common reasons why Rublon bypasses users.

Have questions about bypass or MFA? Contact Rublon Support.

Filed Under: Blog

Try Rublon for Free
Start your 30-day Rublon Trial to secure your employees using multi-factor authentication.
No Credit Card Required
Rublon 5 star reviews on Gartner Peer Insights

Footer

Product

  • Regulatory Compliance
  • Use Cases
  • Rublon Reviews
  • Authentication Basics
  • What is MFA?
  • Importance of MFA
  • User Experience
  • Authentication Methods
  • Rublon Authenticator
  • Remembered Devices
  • Logs
  • Single Sign-On
  • Access Policies
  • Directory Sync

Solutions

  • MFA for Remote Desktop
  • MFA for Windows Logon
  • MFA for Remote Access Software
  • MFA for Linux
  • MFA for Active Directory
  • MFA for LDAP
  • MFA for RADIUS
  • MFA for SAML
  • MFA for RemoteApp
  • MFA for Workgroup Accounts
  • MFA for Entra ID

Secure Your Entire Infrastructure With Ease!

Experience Rublon MFA
Free for 30 Days!

Free Trial
No Credit Card Required

Need Assistance?

Ready to Buy?

We're Here to Help!

Contact

Industries

  • Financial Services
  • Investment Funds
  • Retail
  • Technology
  • Healthcare
  • Legal
  • Education
  • Government
  • Utilities

Documentation

  • 2FA for Windows & RDP
  • 2FA for RDS
  • 2FA for RD Gateway
  • 2FA for RD Web Access
  • 2FA for SSH
  • 2FA for OpenVPN
  • 2FA for SonicWall VPN
  • 2FA for Cisco VPN
  • 2FA for Office 365

Support

  • Knowledge Base
  • FAQ
  • System Status

About

  • About Us
  • Blog
  • Events
  • Co-funded by the European Union
  • Contact Us

  • Facebook
  • GitHub
  • LinkedIn
  • Twitter
  • YouTube

© 2025 Rublon · Imprint · Legal & Privacy · Security

  • English