More MFA options

Authenticate with recovery code instead of using MFA for an application

Use recovery code an an alternative to MFA when the second factor device is not available. MFA or 2FA works when the user possesses the second factor device like laptop for email, duo authenticator; or a cell phone to receive the SMS. If a user forgets the device, you can validate the user with a valid identification, and then provide a recovery token that can be used to log in to the application. The recovery token expires within 24 hours. If you enable global MFA in the identity provider with the MFA factors, or enable MFA in the application, or enable MFA in the directory, a recovery code can be generated and provided to the validated user from the directory. With the recovery code the user can access the application. After the user gets this second factor device like a laptop or cell phone, the admin can delete the recovery code if it is not expired. If the user does not use the recovery code before the expiration, the admin can generate another recovery code for the user.

Enable recovery code generation in the identity provider

Enable the generation of recovery codes for users in a directory associated with this identity provider (IdP).

  1. Log in to EAA Management Portal.

  2. In the EAA Management Portal navigation menu, select Identity > Identity providers.

  3. On the identity provider card, click Configure Identity Provider, and select MULTIFACTOR.

  4. In General MFA Settings select Recovery code.

  5. Click Save and exit or Save and go to Advanced Settings.

  6. Deploy the identity provider.

Next, copy or delete the recovery code for a user.

Copy or delete the recovery code for a user

Access the MFA enabled directory assigned to the user to generate the recovery code for the user.

  1. To validate the user check a valid form of authentication like employee ID number or any other document used by the organization.

  2. Log in to EAA Management Portal.

  3. In the EAA Management Portal navigation menu, select Identity > Directories.

  4. On the directory card that includes the user for whom you want to generate a recovery code, click Users.

  5. Select the user for whom you want to generate a recovery code.

  6. Select Actions > Generate Recovery Code.

  7. Select the identity provider associated with the application.

  8. Set the expiration period and note the expiration time for the recovery token. The default expiration period is 24 hours. After the expiration period, the recovery token is automatically deleted.

  9. Copy or delete the recovery code.

    1. To copy the recovery code, click COPY.

    2. To delete a previously generated recovery code, click DELETE.

  10. Click OK.

  11. Provide the recovery code to the validated user.

Next, use a recovery code to log into an application.

Use a recovery code to log into an application

When a user gets a recovery code as an alternative to MFA from the administrator, they should follow the below procedure to log into the application.

  1. Log in with your credentials.

  2. Enter the authentication code you receive.
    A code is sent to the user's email, if email has been set up as the MFA factor. A code is sent to user's cell phone, if SMS has been set up as the MFA factor.

  3. If you do not have any authentication device, to get a recovery code use Click here option. Click Contact Administrator.

  4. Enter the recovery code and click VERIFY.
    User logs into the application.

‚ÄčAkamai‚Äč MFA two-factor authentication

Enterprise Application Access (EAA) allows you to use Akamai MFA as a second-factor authentication (2FA) for an ‚ÄčAkamai‚Äč identity provider (IdP). With both Enterprise Application Access and ‚ÄčAkamai‚Äč MFA on the same contract, the users from all of EAA directories may be provisioned into ‚ÄčAkamai‚Äč MFA. This action is executed from the ‚ÄčAkamai‚Äč MFA service.

Integrate ‚ÄčAkamai‚Äč MFA with EAA

Prerequisite:
Enterprise Application Access ( EAA) and ‚ÄčAkamai‚Äč MFA must be available in the same contract.

  1. Generate your integration credentials in ‚ÄčAkamai‚Äč MFA.

  2. Configure Akamai MFA as a 2FA in Enterprise Application Access ‚ÄčAkamai‚Äč identity provider.

  3. Log in to EAA Management Portal.

  4. In the EAA Management Portal navigation menu, select Identity > Identity providers.

  5. Select your identity provider. Check if added the directory with your users to this identity provider.

  6. On your identity provider card, click Configure Identity Provider, and select MULTIFACTOR.

  7. Enable IdP MFA policy.

  8. Select Akamai MFA as one of the MFA Factors.

  9. Paste the integration credentials: Integration ID, Signing Key, and API Host.

  10. Select Akamai MFA UserID attribute.
    It determines the attribute that is sent as the username in ‚ÄčAkamai‚Äč MFA. Choose one of the following:

    • Email
    • SAM account name
    • User Principal Name (UPN)
    • Domain/SAM account name

    This attribute must be the same as the Login Preference in the directory with your users associated with the identity provider. Otherwise you get an error Your MFA configuration has failed. when you login to access the application.

  11. Click Save and exit.

  12. Deploy the identity provider.

  13. Assign the identity provider to one or more EAA applications.

    ūüďė

    The identity provider must be assigned to at least one EAA application for ‚ÄčAkamai‚Äč MFA to be used.

  14. Deploy the application.

  15. Log in to the application through a web browser.

  16. Enter your first factor authentication like username, password or select the certificate.
    New users are redirected for PushMFA registration.

  17. Self-enroll in ‚ÄčAkamai‚Äč MFA. Install ‚ÄčAkamai‚Äč MFA mobile app on google android or iPhone and choose in-line enrollment for your smartphone, phone, iPad or tablet.
    The user is redirected to the application to access the resource.

Limitations of ‚ÄčAkamai‚Äč MFA

  • ‚ÄčAkamai‚Äč MFA cannot be used with other MFA factors for an identity provider.

  • User enrollment cannot be changed in Enterprise Application Access. It is managed by Enterprise Center and can be reset in Enterprise Center.

  • ‚ÄčAkamai‚Äč MFA is set up per user so you don't need to re-enroll the user on other identity providers or apps. Enrollment stays even if a user is deleted and added back in Enterprise Application Access.

Duo Security two-factor authentication

Duo Security is a multifactor authentication (MFA) provider that confirms the identity of users and the health of their devices before the user connects to your applications. Duo supports push notifications, TOTP (time-based one-time password), SMS (text message), voice calls, and emails as second factor authentication (2FA) features as a service.

Enterprise Application Access (EAA) provides remote access and MFA for on premise applications and also integrates with Duo’s 2FA services. If you use Duo as a 2FA solution for access to your applications, you simply need to provide some Duo-specific information in Enterprise Application Access to allow the products to communicate and verify identity and access privileges.

Within the Duo application, a Duo administrator can generate a unique set of configuration parameters that the applications use to authenticate 2FA. These configuration parameters are then entered into the Enterprise Application Access corresponding MFA fields. The configuration parameters are the following:

  • Integration key or ikey. A unique identifier that allows you to retrieve users' API keys based on email and password.

  • Secret key or skey. A unique identifier used for encryption of data.

  • API hostname. Your API hostname used for all API interactions with Duo. For example, api-XXXXXXXX.duosecurity.com.

The ikey and skey uniquely identify a specific application to Duo. API hostname is unique to your account, but shared by all of your applications.

  • Duo UserID attribute. When selected in Enterprise Application Access determines how the usernames listed in Duo appear. Choose one of the following:
  • Email
  • sAMAaccountName
  • User Principal Name (UPN)
  • Domain/sAMAaccountName

When you use the Enterprise Application Access Cloud directory or Open LDAP to authenticate users in the Login Portal, Enterprise Application Access supports only email as the Duo UserID attribute.
When you use the Active Directory (AD) to authenticate users in the Login Portal, Enterprise Application Access supports all Duo UserID attributes.
All communication between EAA Login Portal and Duo is secured with TLS. Enterprise Application Access validates the server certificate before sending any information or data to the Duo service.

Integrate Duo MFA with EAA

To configure Duo Security two-factor authentication (2FA) in Enterprise Application Access (EAA) you need to set up and admin account in Duo and retrieve some key information to use it in configuration of Duo MFA in Enterprise Application Access.

To get more information about Duo 2FA, visit Duo web help.

  1. Create Duo admin account and retrieve some key information.

    1. Create a Duo admin account.

    2. Follow the on-screen prompts to activate Duo Mobile.

    3. Go to the Duo Applications page.

    4. Locate the respective Duo application to protect and select.

    5. To generate the Integration key, Secret key, and API hostname, click Protect an Application.

Next, configure Duo MFA in EAA Management Portal. You can add Duo multi-factor authentication (MFA) to any EAA IdP you have configured. Duo MFA is configured similar to, and works alongside, other EAA MFA options.

  1. Log in to EAA Management Portal.

  2. In the EAA Management Portal navigation menu, select Identity > Identity providers.

  3. Select your identity provider (IdP) you wish to configure or Add a new identity provider.

  4. On your identity provider card, click Settings, and select MULTIFACTOR.

  5. Enable IdP MFA Policy. It's an optional step to enable a global MFA policy.

  6. Select MFA factors to apply.

  7. Select Duo.
    The Duo configuration parameters appear.

  8. Enter Integration key, Secret key, and API hostname from previous steps.

  9. Select one Duo UserID attribute.

  10. Click Save and exit or Save and go to Advanced Settings.

  11. Deploy the identity provider.


Did this page help you?