This documentation is for WSO2 Identity Server 5.3.0 . View documentation for the latest release.
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

This topic describes multi-factor authentication (MFA) and guides you on how to enable MFA for the WSO2 Identity Server management console. By default, WSO2 Identity Server is shipped with username/password based authentication. You can further strengthen the security of this authentication by adding an additional authentication step to authenticate with basic authentication, FIDO, TOTP etc. 

About multi-factor authentication

With the rapid growth of the internet, more and more services are available for use by enterprises and organizations. However, username and password based authentication still plays a major role in authenticating users, and it is essential to use a strong password to keep your computer, data, and accounts safe. However, if you are like most users, you will find that it is challenging to remember a strong password, especially if you have to change it once in awhile.

Multi-factor Authentication (MFA) creates a layered defense and makes it more difficult for an unauthorized person to access a target such as a physical location, computing device, Web service, network or database. If one factor is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target.

Authentication factors in MFA rely on two or more independent credentials of the three categories.

  • Knowledge factors - Things only the user knows, such as passwords
  • Possession factors - Things only the user has, such as ATM cards
  • Inherence factors - Things only the user is, such as a fingerprint

With a combination of two or more factors from the above three, the user is authenticated. A basic example is when withdrawing money with an ATM card; the card is the possession factor and the pin number is the knowledge factor.

Configuring multi-factor authentication for WSO2 IS

  1. Start the WSO2 IS server and login to the management console.
  2. Click Add under Service Providers on the Main tab. Enter a service provider name and click Register
    Since the service provider is for the WSO2 Identity Server itself, in this tutorial the service provider is referred to as 'self'. 
  3. Expand Inbound Authentication Configuration>SAML2 Web SSO Configuration and click Configure
  4. Select Manual Configuration and enter the following details. Click Register
    1. Issuer - carbonServer
    2. Assertion Consumer URLs - https://localhost:9443/acs
    3. Enable Response Signing - true
  5. Expand Local and Outbound Authentication Configuration and select Advanced Configuration to configure multi-factor authentication.
    There are two types of multi-factor authentication that you can configure here. 
    • Multi-option authentication: This can be configured by clicking Add Authenticator. Clicking this again will enable you to create another authentication option. These can be either local or federated authenticators.
    • Multi-step authentication: This is configured by clicking Add Authentication Step. Clicking this again will enable you to create another authentication step. These can be either local or federated authenticators.
  6. Click Add Authenticator to add a Local Authenticator. You can choose the type of authenticator using the dropdown. Clicking Add Authenticator again will enable you to add a second local authenticator and configure multi-option authentication using two local authenticators. Alternatively, you can click Add Authentication Step and configure a Local Authenticator in one step by selecting the local authenticator from the dropdown and clicking Add Authenticator. You can do the same for the second step.

    As an example for this scenario, basic and fido are used as the two authenticators. Basic authentication allows you to authenticate users from the enterprise user store while FIDO authenticates you externally.

    If you are adding FIDO as an authenticator, see Multi-factor Authentication using FIDO for more information and follow the instructions given in the topic to configure it.

  7. Select whether this is a Subject StepAttribute Step or both. In the case of multiple steps, you can have only one step as the subject step and one as the attribute step.
  8. Click the Update button. 
  9. This navigates you to the previous screen with your newly configured authentication steps. Click Update again to save changes. 
  10. Shutdown WSO2 IS and open the authenticators.xml file found in the <IS_HOME>/repository/conf/security folder.
  11. Enable the SAML2SSOAuthenticator by changing the disabled parameter to false

    <Authenticator name="SAML2SSOAuthenticator" disabled="false">
  12. Change the value of the <Priority> property found under the SAML2SSOAuthenticator to 1. 

  13. Save and close the authenticators.xml file. 

Try it out

  1. Start the WSO2 IS and navigate to the following URL: https://localhost:9443.
  2. You will now be prompted for extra steps of authentication depending on the authentication options and steps you added above. 

You have successfully configured multi-factor authentication for the WSO2 Identity Server management console. 

  • No labels