Two-Factor Authentication
To strengthen user logon security, M365 Security Plus supports two-factor authentication for default help desk technicians and AD login help desk technicians. Once enabled, M365 Security Plus will require them to authenticate using one of the authentication mechanisms below whenever they log in. You can select any of the below two-factor authentication methods for the help desk technicians and/or AD login technicians. Once they have been enabled, the technicians will have to configure the chosen TFA during their login process.
Setting up Two-Factor Authentication
- Log in to M365 Security Plus as an administrator.
- Navigate to Delegation > Other Settings > Logon Settings.
- Click the Two-Factor Authentication tab.
- Toggle the Two-Factor Authentication switch to Enabled.
- Select the authentication methods of your choice from the list provided.
Note:
- If multiple authentication options are enabled, then the user will be asked to choose one of them at the time of logging in.
- Make sure you configure the authentication option you’ve chosen by entering all the required details.
- Click Save.
Email Verification
When this option is selected, M365 Security Plus sends a verification code via email to the user’s email address. The user has to enter the verification code to successfully log in.
Configuration steps:
- Configure your mail server settings if you haven't already.
- Enter a Subject for the email.
- Enter a Message in the box provided.
- Click the exclamation point to set a priority as per your requirements.
- Click Macros at the bottom to insert macros in the email message.
- Once you are done, click Save.
Once enabled, users will be asked to enroll for two-factor authentication by entering their email address during login.
Microsoft Authenticator
Securely sign into your account using Microsoft Authenticator. Once enabled, users will be required to enter a code generated by Microsoft Authenticator for identity verification.
Configuration steps:
- Just click Enable Microsoft Authenticator.
Google Authenticator
Securely sign into your account using Google Authenticator. Once enabled, users will be required to enter a six-digit security code generated by Google Authenticator for identity verification.
Configuration steps:
- Just click Enable Google Authenticator.
Note: Once any of the two options above are enabled, the technicians will be asked to enroll themselves for two-factor authentication using either Microsoft Authenticator or Google Authenticator during the login process.
RSA SecurID
RSA SecurID is a mechanism developed for performing two-factor authentication for a user. Users can use the security codes generated by the RSA SecurID mobile app, hardware tokens, or tokens received via email or SMS to log in to M365 Security Plus.
Configuration steps:
- Log in to your RSA admin console (e.g., https://RSA machinename.domain DNS name/sc).
- Go to the Access tab. Under Authentication Agents, click Add New.
- Add the M365 Security Plus server as an authentication agent and click Save.
- Go to the Access tab. Under Authentication Agents, click Generate Configuration File.
- Download the AM_Config.zip (Authentication Manager configuration) file.
- Extract sdconf.rec from the ZIP file.
- In M365 Security Plus, under RSA SecurID configuration, click Browse and select the sdconf.rec file.
- Ensure that the required authapi.jar file and its Log4j.jar files are present in the <installation_directory>/lib folder. If not, obtain the latest authapi.jar file and its latest Log4j.jar files from RSA SecurID, and add these files in the <installation_directory>/lib folder.
- Click Save.
Duo Security
Duo Security is a two-step verification service that provides additional security while accessing applications. Users can use the six-digit security codes generated by the Duo mobile app or push notification to log into M365 Security Plus.
Configuration steps:
- Log in to your Duo Security account (e.g., https://admin.duosecurity.com/) or Sign up for a new account and log in.
- Go to Applications. Click Protect an Application.
- Search and select Web SDK. Click Protect this Application.
- Copy the Integration key, Secret key, and API hostname, and paste them in M365 Security Plus.
- Click Save.
Note: Please make sure you select the exact username pattern you use in Duo Security.
Also, if you are using older versions of Internet Explorer, then add the API hostname (e.g., https://api-325d33c0.duosecurity.com) and admin console (e.g., https://admin-325d33c0.duosecurity.com) as a trusted or intranet site.
RADIUS Authentication
Remote Authentication Dial-In User Service (RADIUS) is an industry standard client/server authentication protocol that enhances security by protecting networks from unauthorized access.
RADIUS-based two-factor authentication for M365 Security Plus can be configured in just two simple steps.
Configuration steps
Step 1: Integrate RADIUS with M365 Security Plus
- Log into the RADIUS server.
- Navigate to the clients.conf file (/etc/raddb/clients.conf).
- Add the following snippet in the clients.conf file:
client ProductServerName
{
ipaddr = xxx.xx.x.xxx
secret = <secretCode>
nastype = other
}
- Restart the RADIUS server.
Step 2: Configure M365 Security Plus for RADIUS
- Select RADIUS Authentication.
- Enter the IP address or the name of the RADIUS server.
- Enter the Server Port number for RADIUS authentication.
- Select the protocol used for RADIUS authentication from the drop-down list.
- Provide the Secret Key that was added to the clients.conf file in the RADIUS server.
- Set the Username Pattern.
- Set a duration for authentication Request Time Out duration.
- Click Save.
Note: The Username Pattern is case-sensitive. Please make sure you select the exact pattern (uppercase or lowercase) you use in your RADIUS server.
Backup verification codes
Backup verification codes allow users to log in when they don’t have access to their phone or face issues with one of the second-factor authentication methods. When enabled, a total of five codes will be generated. A code, once used, will become obsolete and cannot be used again. Users also have the option to generate new codes.
Enabling the Backup Verification Code option
- To enable backup verification codes, check the Backup Verification Code box.
Registering for backup verification codes
- Users need to click the Manage Backup Verification Codes link to view the codes.
- Users can also download the codes as a text file, print them, and get them delivered to their personal email address; they can also generate new codes.
- Users need to click the Manage Backup Verification Codes link to view the codes.
Using the backup verification code to log in
- To use backup verification codes during login, users need to click the Don't have verification code? link in the second-factor authentication page.
- On the backup verification code page, they need to enter one of their backup verification codes and click Verify Code to log in.
Managing users for two-factor authentication
As an admin, you can view which authentication method users have opted for and disable their two-factor authentication using the Manage Users option.
To do this:
- Under the Two-Factor Authentication tab, click Enrolled Users.
- In the Enrolled Users pop-up, you can view the list of users enrolled for two-factor authentication and the authentication method they have chosen.
- To remove a user, select the user and click the Delete icon.
Personalize two-factor authentication method for users
The users enrolled in two-factor authentication can modify their preferred authentication method and manage trusted browsers by following the steps below:
- Go to the My Account profile icon in the top-right corner of M365 Security Plus.
- Select the Two-Factor Authentication option.
- To modify the authentication mode, click Modify Authentication mode.
- To manage a trusted browser, click Manage Trusted Browsers.
Custom TOTP Authenticator
The Custom TOTP Authenticator feature helps you secure your accounts with two-factor authentication. It can now be easily configured in M365 Security Plus. Securely sign into your account using any authenticator like Google, Microsoft, or another custom authenticator app. Once enabled, users will be required to enter a code generated by the authenticator for identity verification.
- Select Custom TOTP Authenticator.
- Check the box for Enable Custom TOTP Authenticator.
- Enter the Authenticator Name, Passcode Length, Passcode Expiration Time, and Passcode Hashing Algorithm.
- Configure the Account Name Format and upload the Authenticator Logo.
- Click Save.
Advanced Settings
You can fine-tune your 2FA implementation for M365 Security Plus with the Advanced Settings menu. This allows you to enable 2FA for help desk technicians with Microsoft 365 authentication, set up trust for browsers, and disable 2FA for a select list of help desk technicians.
To access advanced settings,
- Log in to M365 Security Plus as a technician who can modify Two-Factor Authentication settings.
- Navigate to Delegation → Other Settings → Logon Settings.
- Click the Two-Factor Authentication tab.
- Toggle the Two-Factor Authentication switch to Enabled.
- Click Advanced Settings.
Under Advanced Settings, you can configure the following settings:
2FA for Microsoft 365 Technicians:
To allow SSO by default, 2FA is disabled for technicians who use Microsoft 365 authentication. If this option is enabled, technicians will have to go through the product's 2FA method, even though they are logged in using Microsoft 365 MFA.
Configuration steps:
- Select Enable 2FA for technicians who use Microsoft 365 authentication.
Display Trust this browser option when technicians login using 2FA.
- Select Display Trust this browser option when technicians login using 2FA..
- Enter the number of days for which the browser should be trusted. This option is set to 180 days by default.
Exclude 2FA for the selected help desk technicians:
2FA is a secure method of authentication. However, there are some scenarios where administrators can be allowed to bypass it. For example: in environments with lower risk profiles, help desk technicians can be given more flexibility on how they login to the product or when they login to the product frequently, bypassing 2FA can be convenient for them to conduct their tasks. You can now set up M365 Security Plus to exclude 2FA for a select list of help desk technicians.
Configuration steps:
- Select Exclude 2FA for the selected technicians.
- Click on the icon to add technicians for whom 2FA should be excluded.
- Select the help desk technicians for whom 2FA should be excluded. You can also filter the list of technicians by Authentication Type using the Filter By dropdown.
- Click OK to exclude 2FA for the selected help desk technicians.
Don't see what you're looking for?
-
Visit our community
Post your questions in the forum.
-
Request additional resources
Send us your requirements.
-
Need implementation assistance?
Try onboarding