Configuring MFA in OCI IAM Identity Domain
MFA configuration is a policy driven configuration and OCI IAM allows you to create different rules for triggering MFA. These steps provide a simple approach for configuring MFA in a customer's OCI IAM Identity Domain with a default setting provisioned during OCIM. This approach is based on group membership where only members of a newly created group are triggered for MFA during OPERA Cloud services login and R&A login.
- Log in to OCI Cloud console as an OCI cloud administrator user.
- Open the navigation menu and click Identity & Security. Under Identity, click Domains.
- Click the name of the identity domain in which you want to work. (You might need to change the compartment to find the domain that you want.)
- On the Domain page, click Groups.
- On the Groups page, click Create Group.
- Enter a name for the group, for example: MFAENABLED.
- Search and Add users as members of the group for which MFA is to be triggered during OPERA Cloud services login.
- Click Create and go back to the Domain page.
- On the Domain Details page, click Security.
- On the Security page, click MFA.
- Under Factors, select each of the factors required to access an identity domain. For an explanation of each factor, see Configuring Authentication Factors.
- (Optional step) Click Configure for the MFA factors you have selected. For instructions for each factor, see Configuring Authentication Factors.
- (Optional step) Set the Maximum number of enrolled factors users can configure.
- (Optional step) Use the Trusted devices section to configure trusted device settings. Similar to "remember my computer," trusted devices do not require the user to provide secondary authentication each time they sign in.
- (Optional step) Under Sign-in rules, set the maximum number of unsuccessful MFA attempts a user can make before being locked out.
- Click Save changes, and then confirm the change.
- Follow the below steps to configure new sign on rules to
enable MFA in the default sign-on policy. This default sign-on policy
will be available out of the box in a customer's OCI IAM Identity
Domain.
- On the Security page for the domain, click Sign-on policies.
- On the Sign-on policies page, click Default Sign-On Policy.
- On the Default Sign-On Policy page, under Resources, click Sign-on rules.
- Click the Add sign-on rule, carefully read the confirmation, and click Continue.
- Enter the rule name, for example: Group based MFA.
- Under conditions, in Group Membership, add the group created earlier in step 6.
- Under Actions, select Allow access. Select the prompt for an additional factor and select Specified factors only.
- Select factors, we recommend Mobile app passcode, Mobile app notification, and Fast ID Online (FIDO) passkey authenticator.
- Select Once per session or trusted device under Frequency.
- Select Required under Enrollment.
- Click Add sign-on rule.
- On the Default Sign-On Policy page, click Edit Priority.
- Carefully read the confirmation and click Continue.
- Click the priority number of the newly created rule to ensure it is above the Default Sign-On Rule where priority 1 is the newly created rule and priority 2 is the Default Sign-On Rule.
- Click Save Changes.
- Test MFA with the user who is part of the newly created group (the group added in the sign-on rule).
- To learn more about registering for MFA using Mobile app passcode or Mobile app notification mode, watch this tutorial video Oracle Mobile Authenticator App Tutorial Video.
Parent topic: Multi-Factor Authentication