Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

Unregistered Multi-factor Authentication (umfa) is about being possible to require Unregistered SMTP or Unregistered SMS as the second factor authentication method for unregistered users returned from a SAML or an OpenID Connect method.

When Unregistered SMTP or SMS is used as the second factor method, then instead of end user having to enter their email address or mobile phone number, they are passed as method attributes from the first factor OIDC/SAML method.

Configuration

  1. Create the first factor method

    1. SAML

    2. OpenID Connect

  2. Configure the identity provider to return end user’s email address for the Unregistered SMTP and mobile phone number for the Unregistered SMS.

  3. Create an attribute mapping which maps the attribute names to be exactly as specified below, which is what Unregistered SMTP and SMS method expect the attribute names to be and to contain correct information for the multi-factor authentication to work.

    1. phone_number for the mobile phone number.

    2. email for the email address.

  4. Create the second factor method

    1. Unregistered SMTP

    2. Unregistered SMS

  5. While not required, it’s useful to verify at this point that both work individually without the umfa configuration.

  6. To enable the second factor method to be used in multi-factor authentication, set configuration string mfa true for the second factor method.

    1. PUT /method/unregistered.smtp
      configuration:mfa true

  7. Set the second factor method as the next factor method for the first factor method.

    1. PUT /method/oidc.1/$link/nextFactor/method/unregistered.smtp

  • No labels