Skip to main content

Adaptive Authentication

Overview

The Adaptive Authentication service verifies the user identity based on factors such as location, device status, and end-user context. Using these factors, adaptive authentication intelligently chooses the appropriate authentication methods and enables access to authorized resources.

Business Scenarios for Adaptive Authentication

Adaptive Authentication offers several business scenarios that can enhance security and user experience:

  1. Deny Access: Use Adaptive Authentication to deny access to certain users or groups based on predefined conditions. Administrators can configure rules to block access for specific users or groups if they match certain conditions, such as IP address range, group membership, or application access.

  2. Request Specific Authentication Factors: Configure journeys to request specific authentication factors for higher-risk applications. administrators can set up Adaptive Authentication for sensitive applications or transactions to require additional factors such as one-time passwords (OTP), push notifications, or biometric authentication.

  3. Different Rules for Inside and Outside Networks: Apply different authentication rules based on whether users are accessing resources from inside or outside the organization's network. Administrators can define separate authentication policies for internal network access and external network access. For instance, stricter authentication requirements may be enforced for external access to ensure security compliance.

Prerequisites

Before setting up Adaptive Authentication, ensure the following prerequisites are met:

  • Active Directory (AD) and Go Broker Configuration: Integrate Active Directory with BlockID for user authentication and access control. Ensure at least one Go Broker is available per Active Directory to facilitate seamless communication and authentication between BlockID and Active Directory.
  • BlockID Attributes & AD Attribute Mapping: Ensure that BlockID attributes include the groups attribute and map the memberof directory attribute to the groups BlockID attribute for group-based authentication.
  • Enable Adaptive Authentication Module: Toggle on the Adaptive Authentication journey in AdminX.

Step 1: Navigate to Adaptive Authentication

  1. Login to AdminX.
  2. Go to Authentication > Adaptive Authentication > Adaptive Authentication Journey.

Step 2: Create a new journey

  1. On the Adaptive Authentication Journeys list page, click the Add new adaptive auth journey button.

  2. Provide a descriptive name for the journey.

  3. Enable or disable the journey as needed.

Step 3: Define Conditions

Adaptive Authentication Journeys allow administrators to build authentication paths for users based on various conditions. Define a condition from the following options:

ConditionOperatorDescription
Applicationis one ofSelect the appropriate applications for which this journey must be applied.
Groupsis one ofSpecify the AD groups to which this journey has to be applied.
Groupsis not one ofSpecify the AD groups to which this journey must not be applied.
IP Addressis in the range ofSpecify the range of IP address to which this journey has to be applied. The IP address range must be in the following format:
10.0.64.0-10.0.64.57
IP Addressis outside the range ofSpecify the range of IP address to which this journey must not be applied. The IP address range must be in the following format:
10.0.64.0-10.0.64.57
Usernameis one ofSpecify the list of users for whom this journey is applicable.
Domainis one ofSpecify the domain to which this journey has to be applied.
Domainis not one ofSpecify the domain to which this journey does not apply.
Machine Nameis one ofSpecify the machine name to which this journey has to be applied
Machine Nameis not one ofSpecify the machine name to which this journey must not be applied.
Machine & Useris one ofSpecify both the machine and the username to whom this journey has to be made applicable.

Step 4: Set Decision Actions

Define the outcome for each condition:

Authentication MethodDescription
Deny AccessDenies access when the user matches against a journey.
Just PasswordRequires the user to provide only a password to log in.
Push NotificationApproves sign-ins via push notification sent to the BlockID App.
QR CodeScans the QR code using the BlockID App.
FIDOAllows the use of Windows Hello, Mac TouchID, or your security key to login.
BlockID app CodesThis requires entering the 6-digit code generated by the BlockID app.
Hardware Token OTPProvides username and requires entering a 6-digit code generated from a hardware token.
Password & any OTPRequires providing a password and using passcodes generated through any channel.
Password & Web OTPRequires providing a password and using passcodes generated through Email, SMS, Voice, BlockID App, generated through APIs, and hardware tokens.
Password & SMS OTPRequires providing a password and entering a code delivered to the registered phone number via text.
Password & Email OTPRequires providing a password and entering a code delivered to the registered email address.
Password & Voice OTPRequires providing a password and entering a code delivered to the registered phone number via voice call.
Password & Push NotificationRequires providing the password and approving sign-ins via push notification sent to the BlockID App.
Password & FIDOEnter the password and then use your enrolled FIDO devices such as Windows Hello, Mac TouchID, or your security key, to login.
Password & BlockID App CodesRequires providing the password and entering the 6-digit code generated by the BlockID app.
Password & Passcodes from Orion AgentRequires providing the password and then enter the OTP generated by the Orion agent.
Password & Hardware OTP CodesThis option allows users to enter the password and then the code generated from the hardware token.
KerberosThis option allows users to log in using an active Kerberos token.
Kerberos + PushThis option requires users to authenticate with the Kerberos token first, followed by push authentication.
Kerberos + Any OTPThis option lets users authenticate with the Kerberos token first, then complete the process using an OTP generated by 1Kosmos applications.

Previously, when an administrator creates an adaptive authentication journey with the options "Password + MFA" and "Other MFA" such as "Password + OTP" and "FIDO", the authentication method generates two separate sets of rules for each option. As a result, users encounter two options in the first step: "FIDO" and "Password." After entering their password, they are presented with two options again in the second step: "FIDO" and "OTP".

In the current implementation, the algorithm for creating rules has been enhanced where the rule engine will now display only the appropriate authentication methods. In the latest behavior, the user will be displayed with two options in the first step: FIDO and Password. After entering their password, the user will be presented with only the OTP options not the FIDO option.

Step 5: Adaptive Authentication Journey Evaluation

  1. If a user matches multiple journeys, all matching methods are presented.

  2. If a deny access decision is included in a matching journey, access is automatically denied.

  3. All authentication policies are executed without a priority order.

  4. If a user doesn't match any journey, the default authentication journey is initiated.

Step 6: Save and Apply

Save the journey to apply the configuration.

note
  • Ensure that the adaptive authentication journey is correctly configured to improve security and efficiently manage user access to resources.
  • Regularly monitor the performance of your configured journeys and make necessary adjustments to optimize the authentication process.