Quick Start

Updated 2 months ago by admin

Provisioning MFA

To provision MFA powered by IntelliTrustfor an account you control, visit your USS Dashboard and click Account Management. Choose the account to which Cloud MFA should be added, and click .

From the drop-down menu, choose MFA Powered by IntelliTrust.

The number of users you assign to this license must exceed the number of Active Directory users that will be synced.

The users that Cloud MFA can protect are taken from your Active Directory lists. Cloud MFA authentication is based on username (not IP address or MAC address).

In order to correctly sync from Active Directory, a user must have an associated email address and phone number. If the user object cannot be sync'd then a yellow triangle will appear next to the user name:

Adding Authentication clients

In order to allow your users to authenticate with Cloud MFA, you'll need to add at least one Authentication Client.

Visit your USS Dashboard and click ProductsMFAAuthentication Clients.

Click to add a new Client.

Choose the type of Client you wish to add.

Click to check or edit the settings for your new Authentication Client which are needed to configure the Authentication Client (server) software.

Deleting an Authentication Client

You can easily delete an Authentication Client, by simply clicking the icon at the top right of the client.

Don't delete an Authentication Client unless you're sure that's what you want - running Cloud MFA without a correctly-configured Client can have unexpected effects.
If the Client you're trying to delete is used in any Rules, you won't be able to delete it.

Configuring MFA Rules

Cloud MFA uses a powerful and intuitive Rules engine (just like other Cloud USS products).

When a new Authentication Client is added, Cloud MFA will automatically create a set of sensible default Rules. You can see the Rules currently in place for your account by visiting your USS Dashboard and clicking ProductsMFARules.

For the vast majority of users, the default Rules will be sufficient to allow a comprehensive MFA solution, and will not need to be changed. Of course, you can add your own Rules if you need to.

The default Rules

A new Cloud MFA installation will contain two Rules for each Authentication Client: an MFA Rule and a Bypass Rule.

Click to edit a Rule.

The MFA Default Rule

The MFA Rule is the crucial Rule for the MFA product, and dictates how your users are allowed to authenticate. Like other Rules, the MFA Rule is made up of Conditions, First Factor Actions and Second Factor Actions. The MFA Rule is a pre-defined Rule with a sensible set of default Conditions and Actions.

For the majority of users, the default MFA Rule will be sufficient on its own and will not need to be changed. If you do wish to change the Rule, follow the instructions for adding your own Rule.

The Bypass Default Rule

The Bypass Rule is set to Inactive initially. Only enable it if you want to maintain a list of users who are allowed to bypass 2nd-factor Cloud MFA authentication.

If you're using the Bypass Rule, you must at a minimum add an AD Group Condition to the Rule. Without this Condition, the Bypass Rule will apply to all your users (allowing all your users to bypass 2nd-factor authentication, which is almost certainly not what you want).

Like other Rules, the Bypass Rule is made up of Conditions and First Factor Actions. Unlike other Rules, though, the Bypass Rule has no Second Factor Actions. That means that, for users who meet the conditions of this Rule, no further challenge will be issued after initial login. It is therefore strongly recommended that you add an AD Group Condition, and strictly limit access to the AD group you select.

Use the Bypass Rule with caution. Allowing a subset of your users to bypass second-factor authentication inherently exposes your Cloud MFA installation to exploitation.


How did we do?