Skip to main content

Multi-Factor Authentication (MFA)

If you have purchased the [MFA] module, this feature is available. Multi-factor authentication provides enhanced identity verification by supporting a variety of login factors. Each authentication method is assigned a specific security level. When creating MFA strategies—such as User MFA, Application MFA, or User Behavior Analysis (UEBA)—you can freely configure their behavior.

User MFA

This function determines whether a user must undergo secondary authentication during login and what action to take when triggered.
⚠️ Note: If User Behavior Analysis is enabled, User MFA will be disabled and replaced by the UEBA-based mechanism.

Trigger Conditions

ConditionDescription
Abnormal FrequencyTriggered if a user logs in repeatedly (e.g., X times within Y seconds).
Abnormal NetworkTriggered if the login IP is not within the IPs defined in MFA - Common Settings - Network Configuration.
Unusual TimeDetermined based on Time Settings - Restricted Hours and Trusted Zone:
1. Login during a restricted time: triggered
2. Login during allowed time: not triggered
3. Login not in any defined time and not in trusted zone: triggered
Unrecognized DeviceTriggered if the device is not recognized as trusted. Device recognition rules are defined in Common Settings - Device Match Rules.
Abnormal IPEvaluated based on IP Settings and Trusted Zone:
1. IP in greylist: triggered
2. IP in blacklist: login blocked
3. IP in whitelist: not triggered
4. IP not in any list and not in trusted zone: triggered
Out-of-Region LoginTriggered if the user's current city is not part of the trusted region (i.e., based on IP + account data).

Condition Logic

You can define logical relationships between conditions when creating policies:

LogicBehavior
ANDAll selected risks are checked. Multiple risk messages are displayed on the login page.
ORRisks are checked in order of priority. Once one is detected, others are skipped. Only one risk message is shown.

Authentication Action

Defines how the system should respond when login risks are detected:

ActionDescription
Alert NotificationSends a risk alert to the user via SMS/email as configured in Notification.
No ActionIgnores the risk and allows login.
Block LoginBlocks login entirely.
Secondary AuthRequires successful secondary authentication to proceed.

You can also configure success/failure thresholds:

  • After X successful secondary authentications within a time window, the user's context is added to the Trusted Zone, bypassing future MFA.
  • After X failed attempts, the context is moved to the Quarantine Zone, resulting in login restrictions.

ℹ️ Note: A "successful" attempt includes both ignored risks and those passed via secondary authentication.


Secondary Authentication Methods

DepthDescription
Single MethodUser selects one of the configured methods for verification.
Auth ChainUser must complete all methods in sequence as configured.

Priority

User MFA strategies support prioritization. The system checks if the current user matches the [Applicable Scope], then executes the strategy with the highest priority.

If the primary login method’s security level is higher than all configured secondary methods, MFA will not be triggered.

Application MFA

This feature checks whether a user needs to perform secondary authentication when accessing specific applications.

Trigger Conditions

You can specify both user scope and application scope. When a user accesses an application, the system evaluates these conditions to decide if secondary authentication is required.

Authentication Action

Once triggered, the system uses the configured authentication methods to verify the user before granting access to the application.

Priority

Application MFA supports strategy prioritization. The system evaluates the [Applicable User Scope] to determine if a user matches any strategy. If matched, it checks whether the target application is included in the strategy and then applies the strategy with the highest priority.

MFA Execution Rules:

ConditionDescription
No MFA RequiredIf the user’s primary authentication method level is higher than all MFA methods defined for the app, MFA is skipped.
MFA RequiredIf the user has already completed user-level MFA with a method whose level is higher than the app’s methods, MFA is skipped. Otherwise, the app-level MFA is enforced.

User Behavior Analysis (UEBA)

This feature (available with the [MFA] module) provides dynamic risk detection based on user behavior. Compared with static policies, UEBA is more intelligent—analyzing IPs, network fingerprints, identity traits, time, and device characteristics to detect threats like credential stuffing, bot attacks, abnormal logins, etc.

⚠️ Note: If UEBA is enabled, User MFA is automatically disabled and all behavior risk analysis is handled through UEBA.

UEBA Configuration

SettingDescription
Service URLURL of the UEBA risk evaluation API service
Admin CredentialsUsername and password for UEBA API authentication

Ensure that this configuration is correct for the IAM platform to use UEBA features normally.

Data Scope Configuration

Applicable to Anomalous Login Time detection. This ensures that UEBA uses a reliable dataset. If insufficient data exists for a user, and the only detected risk is "anomalous login time," the system will fall back to static user MFA handling.

Bot Detection (CAPTCHA Slider)

When UEBA detects a high bot risk score, a CAPTCHA slider can be required based on configurable thresholds.

Temporary Whitelist

Users added to this list are exempt from UEBA-based risk handling for a limited period. The exemption expires automatically after the next successful login.


Risk Trigger Conditions

UEBA assigns a risk score per scenario (e.g., abnormal IP, bot, geo-anomaly). Actions (e.g., MFA or block) are determined based on which score range the risk falls into.


Secondary Authentication Methods

DepthDescription
Single MethodUser selects one method to complete secondary authentication.
Auth ChainUser must pass all configured methods in sequence.

Priority and Handling Multiple Risks

UEBA strategies can be prioritized just like static ones. The system evaluates matched strategies based on [Applicable Scope] and uses the one with the highest priority.

ScenarioHandling Logic
One Risk DetectedThe system compares the risk score to the defined threshold and takes the appropriate action.
Multiple Risks1. If any risk except "anomalous login time" requires blocking, block the login.
2. If no block, check for any MFA requirement and enforce it.
3. If only "anomalous login time" remains, fallback depends on Data Scope Configuration.

Common Settings

These are shared configurations relevant to User MFA.
⚠️ If User Behavior Analysis is enabled, this section will be overridden by UEBA.

IP Settings

Configure IP-based allowlists (whitelists), greylists, and denylists:

List TypeDescription
WhitelistIPs in this list are fully trusted. Logins from these IPs do not trigger any risk checks.
GreylistIPs here trigger “abnormal IP” risk in User MFA.
BlacklistLogins from these IPs are completely blocked.

Network Settings

Links IP addresses to city locations. Used in MFA evaluations for Abnormal Network risk.

Three main purposes:

ScenarioDescription
User MFA - Abnormal NetworkIPs in network settings will not trigger network anomalies.
Trusted/Quarantine Zone DisplayThe displayed city name is based on this setting (or IP geolocation if missing).
Visualization DashboardsRisk dashboards reflect city names based on this mapping.

Account Settings

Configure account-based allowlists and denylists using conditions like specific users, user types, organizations, roles, etc.

List TypeDescription
WhitelistLogins from these accounts bypass risk checks.
BlacklistLogins from these accounts are completely blocked.

Time Settings

Controls whether User MFA triggers based on login time:

SettingDescription
AllowlistLogin during this time does not trigger "unusual time" risk.
BlocklistLogin during this time does trigger "unusual time" risk.

Trusted Zone

Users are added to the Trusted Zone after a defined number of successful secondary authentications (see User MFA).

Users in the trusted zone are exempt from future MFA under the same login conditions.

You can also define expiration rules in Other - Trusted/Quarantine Expiration Settings.

Trusted Data TypeDescription
Device OnlyAll users logging in with Device A bypass “unrecognized device” risk.
Device + AccountOnly User A using Device A bypasses that risk.
IP + AccountIf IP is not greylisted, User A on IP 10.10.1.1 bypasses “abnormal IP” risk.
City + AccountUser A logging in from a mapped city (e.g., Wuhan) bypasses “out-of-region” risk.
Time Range + AccountIf login occurs during an allowed time window, User A avoids “unusual time” risk.

Quarantine Zone

Users are added to the Quarantine Zone after exceeding a configured number of failed MFA attempts.

Logins from quarantined users are blocked if:

  • Their IP is not in the whitelist
  • Their account is not in the whitelist

Expiration rules can be configured in Other - Trusted/Quarantine Expiration Settings.


Login Factors

Login factors refer to the credentials used in identity authentication.
Combining multiple factors significantly enhances both identity assurance and cybersecurity.


Device Match Rules

Used in User MFA to define Unrecognized Device risk.

A device is identified using a combination of:

  • Operating System
  • Login IP
  • Browser Type
  • Device ID

This combination defines what is considered a "trusted device."

You can:

  • Manually create trusted device records.
  • Automatically insert them into the Trusted Zone after consistent login success.

Special Case: Device ID Enforcement

If Device ID is selected and you enable “Block login if device ID collection fails”, users must have the device plugin installed.

Otherwise, login will fail with this error:

“Device ID retrieval failed. Please enable the device ID plugin and try again.”

If a user continuously succeeds in secondary authentication (or primary login) and device info (or device + account) is included in the policy, the device will be added to the Trusted Zone.


Trusted/Quarantine Expiration Rules

When trust or quarantine entries are automatically or manually created, the expiration time is set based on this configuration.

OptionDescription
PermanentIf unchecked, entries are valid indefinitely.
Timed (with interval)If checked, entry expires at: current date + interval.

Auto-Extend Trusted Devices

You can optionally enable auto-renewal for trusted devices.

If enabled:
When a user logs in using a trusted device or device+account during the trust period, the expiration is extended:

⚠️ Only device-related trust data (device or device+account) supports auto-extension.


Login Factors (Recap)

Login factors are identity verification credentials.
Combining two or more factors significantly improves security:

Examples:

  • Something you know (password)
  • Something you have (OTP token)
  • Something you are (biometrics)

Summary of MFA Flow

  1. User MFA: Triggered during login; can be static or UEBA-based.
  2. Application MFA: Triggered on app access; policy-based.
  3. UEBA: Uses behavior analytics for dynamic risk scoring.
  4. Common Settings: Support trust zones, risk whitelists, device recognition.
  5. Device Match + Trust Expiry: Manage MFA behavior based on environment.