The file attached to this record is the author's final peer reviewed version. Open access article. This paper presents a comprehensive investigation of modern authentication schemes. We start with the importance of authentication methods and the different authentication processes. Then we present the authentication criteria used and we perform a comparison of them in terms of universality, uniqueness, collectability, performance, acceptability, and spoofing. Finally, we present MFA challenges and security issues and present future directions.