Overview#
Authentication intent is the process of demonstrating that an individual intended to perform AuthenticationEstablishing Authentication intent – like entering an One-Time password from a device, inserting a Smart Card, or simply touching the device (known as proof of presence) – can act as a countermeasure against malware using the an endpoint as a proxy for authenticating an attacker without the user’s knowledge. This makes it more difficult for the authenticator to be used for nefarious purposes outside the control of the legitimate user.