9.4. Setting Up MFA

As mentioned previously, Multi Factor Authentication (MFA) can be enabled for user logins. When the user tries to login using the WebUI, they can be redirected to an external Clavister EasyAccess authentication server. This server will use SAML to return the authentication status to InCenter. Depending on how the authentication server is configured, additional factors (such as a code sent to the user's phone) can be requested by the authentication server during the login process.

Enabling MFA

The following steps are needed to enable MFA:

  1. For each user in the InCenter user database that are to be authenticated using MFA, the samlUsername property must be set. For example:

    admin@InCenter:/> user -update -id=admin -samlUsername=myEAusername

    The samlUsername is the username that is expected by the authentication server when it authenticates the user. It can be the same or different from the standard username property.

  2. In EasyAccess, a SAML Metadata object should be created which specifies that the service provider metadata is downloaded from the following URL:

       https://<incenter-server-ip>:8443/saml/mgmtsystem/metadata.xml

    A suitable EasyAccess Federation Scenario is then created to authenticate users, possibly using secondary factors such as tokens (any of EasyAccess's MFA features could be used). This Federation Scenario references the SAML Metadata object created above and will also reference a data source of valid users.

    Further information about EasyAccess setup can be found in the separate EasyAccess Getting Started Guide.

  3. Using SCP or SFTP, upload the following files in PEM format to InCenter:

    • The public key file(s) of the identity provider (such as EasyAccess).

    • The public key file of the service provider (in this case, InCenter).

    • The private key file of the service provider (in this case, InCenter).

    The service provider certificate files must be generated externally using a suitable tool. Also note that any of these files can be alternatively specified in the InCenter CLI as a base64 encoded string.

  4. Using the InCenter CLI, enable the SAML object in Settings and assign values to its properties:

    admin@InCenter:/> cc Settings 
    admin@InCenter:/Settings> set SAML Enabled=Yes
       IdentityProviderCertificates=my_idp.crt
       LoginUrl=https://<auth-server-ip>:8443/saml/authenticate/samlauth
       LogoutUrl=https://<auth-server-ip>:8443/saml/authenticate/SLO
       ServiceProviderCertificate=my_sp_rsa.pem
       ServiceProviderPrivateKey=my_sp_rsa
       IdentityProviderType=EasyAccess

    Note that the IdentityProviderCertificates property could be assigned a comma separated list of more than one public key file.

    In the corresponding EasyAccess federation scenario setup, the LoginUrl corresponds to the scenario's POST SSO URL property and the LogoutUrl corresponds to the POST SLO URL property.

  5. After activate and committing the InCenter configuration changes, MFA is set up.

The MFA Login Sequence

The user login sequence sequence through the WebUI is the following:

  1. The user connects to the InCenter server as usual through a web browser.

  2. If MFA has been enabled for the system, a button for EasyAccess login appears at the top of the login dialog.

  3. The user presses the button and is redirected to web pages displayed by the authentication server. The pages displayed and the extra authentication factors required depend on how the authentication server is configured.

  4. After authentication is successful, the browser returns to the InCenter overview page with the user logged in.

Notes on the MFA Feature

The following should be noted about using MFA with InCenter: