Skip to main content

Standard Multi-Factor Authentication Workflow Configuration

Introduction

Use this guide as a reference to configure a SecureAuth IdP realm that uses the Standard Multi-Factor Authentication workflow.

The Username | Second Factor | Password workflow prompts the end-user for the username, then a second factor option of the end-user's choice, and then the password, in that order.

This can be applied to any realm to access web, SaaS, mobile, or network applications and devices, and SecureAuth IdP out-of-the-box Identity Management (IdM) tools via Multi-Factor Authentication.

SecureAuth IdP Configuration Steps

Workflow

44835067.png

1. In the Product Configuration section, select Certification Enrollment and Validation from the Integration Method dropdown

2. Select Device/Browser Fingerprinting from the Client Side Control dropdown

Workflow

44835068.png

3. Select Username | Second Factor | Password from the Default Workflow dropdown

4. Select Private and Public Mode or Private Mode Only from the Public/Private Mode dropdown

Selecting Private and Public Mode or Private Mode Only generates a device / browser profile in this realm and checks for existing profiles

5. Select which option is selected by default on the client-side page from the Default Public/Private dropdown

SecureAuth recommends selecting Default Private to ensure that profiles are generated and checked in the realm

6. Select True from the Remember User Selection dropdown to automatically select Private or Public on the client-side page, based on the user's previous selection

Browser / Mobile Device Digital Fingerprinting

44835069.png

7. In the Browser Profile Settings section, select Cookie from the FP Mode dropdown to enable SecureAuth IdP to deliver a cookie to the browser after authentication; or select No Cookie if no cookie is to be used

8. If Cookie is selected in step 9, then provide the Cookie name prefix and Cookie length, or leave as default

The cookie name appears as Cookie Name Prefix + company name + hashed value of user ID

The Cookie length sets for how many hours the cookie is valid, e.g. 72 hours

9. Select True from the Match FP in cookie to require the profile ID to be presented and then matched to a profile ID in the directory, with an acceptable Authentication Threshold score; or select False to not require ID matching between the cookie and the stored profile

Tip

If No Cookie is selected in step 7, then steps 8 and 9 can be ignored

10. Set the Authentication Threshold to 90-100% based on preference

11. Set the Update Threshold to a percentage just below the Authentication Threshold

The Update Threshold must be less than the Authentication Threshold

Notice

Review the Profile Comparison Score information below for more explanation of the Thresholds

12. In the Mobile Settings section, select Cookie from the FP Mode dropdown to deliver a cookie to the mobile device; or select App Mode to utilize the DR App for further device / browser validation

13. Leave the Cookie name prefix as the default, or set it to a preferred name

The cookie name appears as Cookie Name Prefix + company name + hashed value of user ID

14. Set the Cookie Length to the amount of hours during which the cookie is valid, e.g. 72 Hours

15. Select True from the Match FP in cookie to require the profile ID to be presented and then matched to a profile ID in the directory, with an acceptable Authentication Threshold score; or select False to not require ID matching between the cookie and the stored profile

Tip

If App Mode is selected in step 12, then steps 13 - 15 can be ignored

16. Select True from the Skip IP Match dropdown to not require an exact IP Address match for profile comparison; or select False to require an exact match

17. Set the Authentication Threshold to 90-100% based on preference

18. Set the Update Threshold to a percentage just below the Authentication Threshold

The Update Threshold must be less than the Authentication Threshold

See Profile Comparison Score information in step 11

19. Set the FP expiration length to the number of days the profile is valid

For example, if this field is set to 10 days, then the user's profile expires in 10 days, no matter how often it is used

Set to 0 for no expiration

20. Set the FP expiration since last access to the number of days the profile is valid since last usage

For example, if this field is set to 10 days, then the user's profile expires if it is not used during the 10 days since it was last employed

Set to 0 for no expiration

21. Set the Total FP max count to the maximum number of profiles that can be stored in a user's account at a given time

If a maximum is to be set, a typical configuration would limit profile storage to 5-8

Set to -1 for no maximum entries

22. If a maximum is set in step 21, then select Allow to replace from the When exceeding max count dropdown to enable the replacement of an existing profile with a new one; or select Not allow to replace if the profiles cannot be automatically replaced

If Not allow to replace is selected, then the user or administrator must manually remove stored profiles from the user profile on the Self-service Account Update Page or Account Management (Help Desk) Page

23. If a maximum is set in step 21 and Allow to replace is selected in step 22, then select Created Time from the Replace in order by dropdown to enable the replacement of the oldest stored profile with the new one; or select Last Access Time to enable the replacement of the least recently used profile with the new one

24. Set the FP's access records max count to the number of access history entries per profile stored in the profile

SecureAuth recommends setting this to 5

* Check Show Custom Component Weights to modify the defaulted weights of each profile's components

Warning

Click Save once the configurations have been completed and before leaving the Workflow page to avoid losing changes

Multi-Factor Methods

44833077.png

25. In the Registration Configuration section, ensure that at least one registration method is enabled for use in this realm

Warning

Click Save once the configurations have been completed and before leaving the Multi-Factor Methods page to avoid losing changes

System Info

Fingerprint5.png

26. In the Plugin Info section, select False from the Java Detection dropdown

Warning

Click Save once the configurations have been completed and before leaving the System Info page to avoid losing changes

End-user Experience

Click here to see the Standard 2-FActor Authentication workflow