Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Multi-factor authentication (MFA) is a well-known security practice that requires users to pair something they know with something they possess before gaining access to their accounts and other types of sensitive information. MFA helps to safeguard against threats arising from compromised credentials. EmpowerID recognizes this , and has implemented an Adaptive MFA engine that provides an extra layer of security for all types of authentication, including Web SSO, LDAP, and RADIUS. EmpowerID's MFA is "adaptive" in that it can be configured to analyze contextual information such as IP addresses, identity providers, devices, distance traveled and velocity since the last login, and other real-time factors to dynamically assess the risk of each login. If a risk is identified, a A strong second factor can be required before access is granted if a risk is identified. These factors, known in EmpowerID as "MFA methods" or "MFA Types," include many popular factors in use today, like DUO Push, YubiKeys, and one-time passwords delivered to a person's favorite communication medium.

In addition to the Adaptive Authentication, which can deny login or require Multi-factor authentication, EmpowerID includes standard MFA policies. In EmpowerID, MFA is a flexible, points-based, or Level of Assurance (LoA) system that is easy to configure. Administrators define a specific number of points, known as "trust or MFA points or LoA," and apply those points to Password Manager policies, MFA methods, IP address ranges, identity providers, and other objects in EmpowerID to provide a target point number for authenticating to EmpowerID, as well as for accessing any third-party applications secured by EmpowerID. Depending on how EmpowerID is configured, users may be required to pass through a number of several checkpoints and be required to submit additional biographic information before gaining access to resources. Checkpoints can include the user's IP address, the selected identity provider, and the Password Manager policy assigned to the user.

...

  • EmpowerID denies access to the Login page to devices with IP addresses that fall within the blacklisted IP Address Range. In step one, three devices browse to the Login page. The IP Address checkpoint denies the mobile phone access because its IP address is blacklisted.

  • EmpowerID grants access to the Login page to devices with non-blacklisted IPs. In step two, these devices include the laptop and tablet. The users with these devices select one of the identity provider options available to them and submit their credentials. EmpowerID adds any trust points set for those identity providers to the user.

  • EmpowerID checks the Password Manager policy assigned to each user and, based on the MFA settings of that policy, directs the user either to perform further identity proofing by selecting an available MFA method or authenticates them, granting them the appropriate access in the system. In the above scenario, the user with the laptop does not need further proof of their identity, while the user with the tablet does. After the user with the tablet meets the requirements of their Password Manager policy, the user is authenticated, and EmpowerID grants them access.

...

In the above scenario, users encounter three checkpoints: The IP Address checkpoint, the Identity Provider checkpoint, and the Password Manager policy checkpoint. Each of these is discussed in greater detail below.

...

One component of EmpowerID's Adaptive MFA engine is the IP Address checkpoint. This checkpoint is the initial gate through which users must pass before gaining access to the EmpowerID Login page. IP Address checkpoints are comprised of special objects you create, known as IP Address Ranges. IP Address Ranges allow you to define the login options available to users accessing your portal from any device that falls within the specified IP address range. EmpowerID provides three IP address range types that you can configure. These include the Internal, External, and Blacklisted ranges. When you create an IP address range, you choose the type and specify the beginning and ending IP addresses for that range. Once you create the IP address range, you can apply it to your Password Manager policies and any federated applications you may use. Usage examples could include:

  • Configuring the login policy settings of a Password Manager policy to require users to accumulate a specific number of Multi-factor authentication trust points to access their accounts based on their IP address. You could require internal network users to accumulate one trust point, while users outside of your network might need to acquire two or more points.

  • You could create an Internal IP address range for your network users and allow them to login log in using Windows authentication only.

  • If you have partner organizations using the EmpowerID Remote Windows Identity Provider to authenticate against your domain, you could create an IP address range for the public IPs of each of those partners, allowing them to log in using the Remote Windows IdP only.

  • You could create an External IP address range for users outside of your network and give those users the option to choose to authenticate using EmpowerID forms auth, one or more trusted social media applications, or a combination of both EmpowerID forms auth and social media logins.

  • You could create a range of known blacklisted IP addresses to deny users with those addresses from accessing your environment.

...

Another component of EmpowerID's Adaptive MFA engine is the Identity Provider checkpoint. The Login page is the second gate through which users must pass before gaining access to EmpowerID. The Identity Provider checkpoint is a selection of SSO connections that you can create for third-party identity provider applications that support the use of using OAuth 2 for identity transactions. This allows you to offer users the ability to authenticate to EmpowerID using the credentials from any OAuth Consumer application in which you establish a trust relationship. EmpowerID provides a number of templates configured out of the box for use with popular OAuth consumer applications like those listed below. In addition, EmpowerID provides a generic template that you can use as a starting point for building your own custom connections.

...

Password Manager Policy Checkpoint

The final checkpoint is the Password Manager Policy. The policy defines login restrictions, password complexity requirements, self-service password reset options, and enrollment requirements that govern a userusers' s ability to manage their own passwords or log in to EmpowerID or any application using EmpowerID for login protection. You can create custom policies or use the default Password Manager Policy that is applied to the entire enterprise. The Authentication Settings in each policy is where define the number of MFA points required to log in from local or remote subnets is defined. Depending on the MFA points required, the user may be authenticated or sent for further authentication. For more information, see Setting Up Password Manager Policies and Assigning Adaptive Authentication Rules to Password Manager Policies.

Insert excerpt
IL:External Stylesheet
IL:External Stylesheet
nopaneltrue
Insert excerpt
IL:External Stylesheet
IL:External Stylesheet
nopaneltrue

...