The login failed. The system asked for more. You typed the password. It wanted proof you were still you.
That is step-up authentication. It is triggered when platform security detects higher risk or sensitive actions. Instead of trusting the first login alone, it demands additional verification. This may be a one-time passcode, biometric scan, hardware key, or another secure factor.
Platform security uses it to protect critical operations—changing account permissions, accessing financial data, modifying system settings. Step-up authentication controls attack surfaces by raising identity assurance exactly when needed, not for every action. It balances security load with user flow.
Risk-based triggers drive this process. Signals include unusual IP addresses, device fingerprints, time anomalies, sudden privilege changes, or flagged transactions. The platform security layer evaluates these signals in real time. If suspicion crosses a set threshold, step-up authentication engages instantly.