Adding an MFA policy - PingOne - PingOne Cloud Platform

PingOne Cloud Platform

bundle
pingone
ft:publication_title
PingOne Cloud Platform
Product_Version_ce
PingOne
PingOne Cloud Platform
category
Administratorguide
ContentType
Guide
Product
Productdocumentation
p1
p1cloudplatform
ContentType_ce
Guide
Guide > Administrator Guide
Product documentation

Create a multi-factor authentication (MFA)multi-factor authentication (MFA)MFA An electronic authentication method where a user is granted access only after presenting two or more verification factors for authentication. policy and then add it as a step to your authentication policy.

  • To add a mobile application authentication method, first add the application. For information, see Adding an application.
  • If you want to add FIDO2 as an authentication method, PingOne provides two out-of-the-box enhanced FIDO policies. If you want to modify them or create your own custom FIDO policy, you'll need to do that before you start. For information, see FIDO policies.

To create an MFA policy, configure the relevant settings for the authentication methods that you want to enable.

  1. Go to Authentication > MFA.
  2. On the MFA Policies page, click the + icon.
  3. In the Name field, enter a meaningful name for the policy.

    There is a maximum of 256 characters.

  4. In the Method Selection list, for users with more than one paired device, define which device is presented to the user for authentication. Select one.
    • User selected default: Allow the user to authenticate with the device they selected as their default device.
    • Prompt user to select: If more than one method is available, when prompted to authenticate, the user is prompted to choose a device from the authentication methods they have paired to their account. Only authentication methods permitted by the relevant authentication policy are shown.
    • Always display devices: Even if the user has only one permitted authentication method paired with their account, the user is prompted to select an authentication method.
    Note:

    The Method Selection setting is not applied if you have enabled device authorization and the user is accessing an application from a trusted mobile device. It is also not applied if the user is trying to access the application with a browser that they have used for FIDO2 authentication in the past. In such cases, FIDO2 is used.

  5. In the Send notification when new device paired list, select how the user should be notified when a new device has been added to their account.
    • No notification: User should not be notified
    • By email, else SMS: By email (or by SMS if no email address available in the user profile)
    • By SMS, else email: By SMS (or by email if no phone number available in the user profile)
  6. To add a mobile application as an authentication method, in the Allowed Authentication Methods section, select the Mobile Applications check box, and then configure the following:
    1. Define the maximum number of times that a one-time passcode (OTP)one-time passcode (OTP)OTP A passcode valid for only one sign on or transaction on a computer system or other digital device. Also known as a one-time password, one-time PIN, or dynamic password. entry can fail with the Passcode Failure Limit
    2. Set the amount of time that the authentication method is locked if the Passcode Failure Limit is exceeded with the Lock Duration.

      Accepted values range from 2 mins - 30 mins.

    3. To add an application, click Add Applications, select the name of the mobile application to use (from among those you have defined for the environment), and click Save.
    4. Define the following fields for the application:
      • OTP & Push: The mechanism that should be used to allow the user to authenticate.

        Choose from:

        • Push: use only the standard push mechanism.
        • OTP: use only OTPs.
        • Push & OTP: use the standard push mechanism and allow OTP as a backup mechanism.
      • Push Notification Timeout: The amount of time that a user has to respond to a push notification before it expires.
      • Allow Pairing: To prevent new users from pairing their device with this authentication method, clear the checkbox.
      • Device Integrity: Define how authentication and registration attempts should proceed in the event that a device integrity check yields inconclusive results. Select Permissive if you want to allow the process to continue. Select Restrictive if you want to block the user in such situations.
        Note:

        The Permissive/Restrictive buttons are displayed only if device integrity checking has been enabled for the application on the Authenticator tab of the Applications definition page.

      • Auto Enrollment: Auto Enrollment means that the user can authenticate for the first time from an unpaired device, and the successful authentication results in the pairing of the device for MFA. To enable, select the check box.
      • Device Authorization: When enabled, the trusted device handles the authentication automatically, and no user involvement is required. This automatic mechanism is used only if the user is requesting access from the same device. To enable, select the check box.

        If you are enabling Device Authorization, choose one of the following options for Extra Verification:

        • Disabled: Do not use an extra verification step.
        • Permissive: A push is sent to the device to be handled automatically. If the push is not received, access is granted nonetheless.
        • Restrictive: A push is sent to the device to be handled automatically. If the push is not received, access is not granted.

        For more information on Device Authorization, see Introduction to PingOne MFA.

      • Pairing Key Lifetime: Indicate how much time an issued pairing key can be used until it expires.
      • Limit Push Notifications: The purpose of this feature is to help you prevent attacks based on repeated push notifications that lead users to eventually accept the request. Define the number of consecutive push notifications that can be ignored or rejected by a user within a defined period before push notifications are blocked for the application:
        • Push Limit: The number of notifications that can be declined or ignored (1-50).
        • Time Period: Time period during which the notifications are counted towards the limit(1-120 secs/mins).
        • Lock Duration: Duration for which the user is blocked (1-120 secs/mins).
  7. To add Authentication App, Email, SMS, or Voice as an authentication method, in the Allowed Authentication Methods section, select the relevant check box, and then define the following for each method that you want to add:
    • Passcode Failure Limit: Define the maximum number of times that OTP entry can fail.
      Note:

      In authentication flows that implement "onetime authentication" with thePingOne MFA API, users are not blocked after passcode failure even if you specify a blocking period in the MFA policy.

    • Lock Duration: The amount of time this authentication method is locked if the Passcode Failure Limit is exceeded (2sec -30mins).
    • Passcode Lifetime (Email, SMS, and voice only): The amount of time the passcode is valid before it expires (max. 30 mins).
    • Allow Pairing: To prevent new users from pairing their device with this authentication method, clear the checkbox.
  8. To add FIDO2 as an authentication method:
    • In the Allowed Authentication Methods section, select FIDO2 and in the FIDO Policy field, select the FIDO policy that you want to apply, or select Use the default policy to use the default FIDO policy.
    • Allow Pairing: To prevent new users from pairing their device with this authentication method, clear the checkbox.

    For information about defining a FIDO policy, see FIDO policies.

    Note:

    If you are editing an existing MFA policy that is using a deprecated FIDO Biometrics or Security Key authentication method, you'll need to replace it with the FIDO2 authentication method and reference an enhanced FIDO policy. For information, see Updating an existing MFA policy to use FIDO2.

  9. Click Save.

    The policy is added to the Policy list.

    Tip:

    In the Policy list, click a policy to see a summary of the policy details in the right pane or edit an existing policy.

Add the MFA policy to the MFA step in the relevant Authentication policy. For information, see Adding a multi-factor authentication step.