5 2 0: Konfigurieren der Multi-Factor Authentifizierung
Übersicht
Multi-factor Authentication (MFA) strengthens the security of user authentication by requiring two or more verification methods before granting access. SEP sesam supports two-factor authentication to provide a higher level of protection. In addition to the primary authentication method (either policy-based or database-based) additional authentication requirements can be configured. This adds another security layer to enhance login functionality and ensure reliable verification of the user’s identity.
Available authentication options
With two-factor authentication, one of the following options can be configured as a secondary authentication method:
- Email authentication: In addition to the primary login credentials, the user must provide a confirmation code received via email. This code expires after 5 minutes, ensuring that only recent and valid codes are used for authentication.
- Certificate authentication: This method requires users to present a trusted digital certificate with their login credentials.
- One-Time Password (OTP) authentication: This method uses an authentication application (such as Samsung Pass, Google Authenticator, or similar tools). During setup, the user creates an application login account, which generates one-time passwords or verification codes. Each verification code is valid for 30 seconds before a new code is automatically generated. The user provides the current verification code with their login credentials to authenticate.
Wichtige Funktionen
- The additional authentication layer at login introduces complexity to enhance user identity verification, minimizing the risk of compromising or misusing user accounts and strengthening the security.
- The secondary authentication method can be configured individually for each user to accommodate their preferences and security requirements.
Configuring the two-factor authentication
To configure two-factor authentication for a new or existing user, follow these steps:
- In the GUI, in the menu bar navigate to Configuration -> Permission Management. The Permission Management window opens.
- In the Users tab, select the user you want to modify and click Change.
- Select the required multi-factor authentication option:
- Off - Disable multi-factor authentication.
- Certificate - Enable secondary authentication using a trusted digital certificate.
- E-mail - Enable secondary authentication using a confirmation code sent by email.
- One time password - Enable secondary authentication using a verification code generated by an authenticator app.
- Click OK and close the window.
Alternatively, you can click Create New to configure a new user and select the required multi-factor authentication method.
Abbildungen
Enforcing two-factor authentication for all users
You can configure a global two-factor authentication method in SEP sesam, which will be enforced for all users.
To enable global two-factor authentication, set the following variable key:
gui.auth.mfa.force_type
Assign one of the following values: certificate, email or OTP. For more information on setting the global variables, refer to Configuring System Settings.
Reseting account for one-time password
In case a user changes their authentication application (such as Samsung Pass, Google Authenticator, or other similar tools) or needs to set up a new application login account for SEP sesam authentication, you can remove the existing OTP configuration and force the creation of a new one.
To reset the OTP account, select the user in the Permission Management window and choose the option Reset One time password.
When the user attempts to log in to SEP sesam, they must open their authentication application (e.g., Google Authenticator, Samsung Pass) and scan the QR code provided by SEP sesam. This will configure a new OTP account and the application will generate new verification codes, which can be used for authentication.
Siehe auch
Benutzerrollen und Berechtigungen – Über Authentifizierung und Autorisierung – Konfigurieren der Datenbank-basierten Authentifizierung – Konfigurieren der LDAP/AD Authentifizierung – Konfigurieren der Zertifikat-basierten Authentifizierung