A security process that requires two forms of verification to access a system.