Cloud CMS supports Multifactor Authentication (MFA) to provide enhanced security for your users and their account credentials.
With Multifactor Authentication is enabled for a user, that user will be required to supply a verification code in addition to their username and password. The verification code is delivered to the user's phone or mobile device via SMS, a phone call or an app. The code may also be delivered via a hardware device depending on the kind of provider you configure.
The verification code is required to log in.
This helps to prevent interested parties from stealing your user's Cloud CMS login credentials and prevents them from using those credentials to perform malicious attacks. The regular username and password credentials are still needed, but a verification code is further needed.
And that code is only ever delivered directly to a user's external device (the external "factor").
Cloud CMS has out-of-the-box support for a couple of common Multifactor Authentication Providers. At least one of these providers must be configured in order for your users to enable MFA login.
If you are an on-premise customer, you may also build your own Multifactor Authentication Providers and configure them into the product using Spring configuration.
You can set up MFA Configuration on the fly for a tenant by setting up a Service Descriptor. Adding a Service Descriptor creates a new Dynamic Authenticator that you can use to authenticate your users to back end authentication providers.
To add an Authenticator, log in to your user interface and go to the
Manage Platform section:
And click on
Services on the left-hand menu:
This takes you to the Services page:
Add a Service Descriptor. This brings up a modal to help you configure your MFA service.
- Give your service a Title and a unique Descriptor Key.
- For Descriptor Family, pick
You then need to pick a Descriptor Type and fill in a Descriptor Configuration.
Here is an example configuration for Authy:
Here is an example configuration for Duo Security:
Create to create your Authenticator.
The following providers are available. Click into one to learn more about how they should be configured.
If you are an on-premise customer, you additionally have the option to set up global configurations for MFA that will apply to your users and special situations. You can use this to assign an MFA account for a specific principal, to assign an MFA account for the
admin user and to assign an MFA account for any authentication via the backdoor password (if you have this configured).
For information on how to set this up, see our article on API Server Configuration for Docker.
Configuring MFA for a User
To configure MFA for a user, you must first log in as that user and then go to your Account Settings page:
And click on
If MFA is not currently enabled for your user, you will see a button labeled
Enable Multifactor Authentication....
Click on the
Enable Multifactor Authentication... button to launch the MFA Setup Wizard.
Click Next. You will then be shown a screen where you can pick from the list of configured Authenticators. These are made available by defining a Multifactor Authentication service. See the section on Platform Authenticators above to configure one or more of these.
After you've selected your Authenticator, click Next.
If you select an Authy Authenticator, the next screen will ask you for information that identifies your mobile device.
Fill in the required information and click Next.
The wizard will now send a confirmation code to your mobile device. This will be delivered via an SMS text message and will contain a code. When you receive the code, enter it into the wizard.
Click Next and the wizard will confirm your code. If your code is successfully confirmed, then your phone will be successfully registered as a second factor for authentication.
Note: Authy provides an optional mobile app that you can use to complete Authy verification -after- the initial registration. This isn't required but if you have it, Cloud CMS will work with it.
If you select a Duo Security Authenticator, the next screen will present a barcode to you. You will need to scan this barcode into your Duo Security mobile app.
Scanning the barcode will complete the wizard and your phone will be successfully registered as a second factor for authentication.
Note: To use Duo Security, you will need to first install the Duo Security mobile app for your iPhone, Android or other mobile device. Using the mobile app, you scan the barcode and it will complete the registration process seamlessly.
Logging in with MFA
When your account is configured for Multifactor Authentication, you will get a slightly different login experience.
You enter your username and password the usual way:
You will then be prompted to provide your verification code. This will be delivered to your mobile device via SMS or via the mobile app on your phone.
Enter the code and click
If your code is correct, you will be logged in.