WPR - MFA Deployment Guide
WPR - MFA Deployment Guide
Whitepaper
November 2020
Authentication
Deployment
Guide
A complete guide to selecting
your MFA solution and
planning your MFA rollout
Okta Inc.
100 First Street
San Francisco, CA 94105
info@okta.com
1-888-722-7871
Whitepaper Multi-Factor Authentication Deployment Guide
Contents 2 Introduction
3 Using IAM with MFA in the Age of Megabreaches
5 8 Things to Consider Before Enabling
Multi-factor Authentication (MFA)
11 Building Secure Multi-Factor Authentication
15 Why Okta for MFA?
Whitepaper Multi-Factor Authentication Deployment Guide 2
Introduction As threats to password security have increased in recent years, multi-factor uthentication
(MFA) has rapidly gained adoption as a method for increasing the assurance of
authentication for consumer and enterprise web and mobile applications.
Web and mobile products most commonly employ the use of multi-factor authentication
with a password used in conjunction with a time-based token that the user possesses,
a push notification to a mobile app, or biometrics. However, the various approaches to
MFA vary widely and present different tradeoffs.
Using IAM There’s no shortage of threats, including: malware, hacking, phishing, and social
Using IAM Using
with IAM
MFA Using
with
in the
MFA
IAM
Agein
withtheMFA
Agein the Age
engineering and these tactics often lead to account compromise and credential theft.
with MFA in
of Megabreaches
of Megabreaches
of Megabreaches
There's no shortage of threats,
There's including:
no shortage
malware,
of threats,
There's
hacking,
including:
no phishing,
shortage
malware,
and
of threats,
social
hacking,
engineering
including:
phishing,
malware,
and these
social
hacking,
tactics
engineering
phishing,
andand
these
social
tactics
engineering and these tactics
the Age of
often lead to account compromise
often lead to
and
account
credential
compromise
often
theft. leadand
to account
credential
compromise
theft. and credential theft.
Top Identity-Related
Top Identity-Related Security
Top Identity-Related
Security Concerns Concerns
Top Identity-Related
Security Concerns
Security Concerns
Megabreaches 59%
Expansion of the
59% 43% 59%
Expansion of the Inconvenient
43%
Expansion of theInconvenient
33% 43%
Lack of IAM
33%
Inconvenient Lack of IAM
33%
Lack of IAM
user base to include user base to include user base to include
authentication authentication policies authentication policies policies
non-employees non-employees controlsnon-employees controls controls
ignored/subverted ignored/subverted ignored/subverted
59% IAM
Using
29%
Usingwith IAM
MFAwith
29%
in the 43%
MFA
24% 29
Agein the Age
% 24% 24% 33%
of Megabreaches
of
Reuse of sameMegabreaches
Reuse of same Stolen Reuse of same Stolen Stolen
Expansion of the passwords
passwords Inconvenient
passwords
credentials credentials credentials Lack of IAM
There's no shortage of threats,
There's including:
no shortage
malware,
of threats,
hacking,
including:
phishing,
malware,
and social
hacking,
engineering
phishing, and these
social tactics
engineering and these tactics
Top Challenges
Top
in Managing
ChallengesIdentity
in Managing
and Access
Identity and Access
Multi-Factor Authentication
Multi-Factor
DeploymentAuthentication
Guide Multi-Factor
DeploymentAuthentication
Guide Deployment Guide 3 3 3
Top Challenges
61 61 in
35 Managing
%35 35 Identity
35 and Access
% % % % %
92 %
Looking 9292%%
Ahead—Priority of IAM77 7777
% Assessing
and
Looking Ahead—Priority of IAM and Assessing
%
Current IAM Capabilities:
of managers do of manager
of man
Current IAM Capabilities:
92% 92%
77% 77%
of managers do
of managers do
30%
report a good or
better ability to
30%
reportreport
better
30%30%
a good
better
a good
or or
abilityability
to to
report a good or better ability to detect
compromise of credentials
45%
integrate IAM data
into their Security
30 45%
detect compromise detectdetect
compromise
compromise Operations Center
of credentials of credentials
of credentials integrate IAM data into their Security (SOC)
Operations Center (SOC)
% 45
report a good or integrate I
Addressing Security
better ability to Addressing
Addressing
Concerns:
Security
Security
Concerns:
Concerns:
into their
Addressing
detect compromise
Most Important
MostSecurity
Potential
Most Concerns:
Important
Important
Benefits
Potential
Potential
of IAM
Benefits
Solutions
Benefits
of IAM
Operation
of IAMSolu S
of credentials (SO
Most Important Potential Benefits of IAM Solutions
8 Things Passwords are hard. The (what feels like constantly) growing list of security requirements
are intended to make passwords secure, but, in many cases, they have had the opposite
to Consider effect. Complex passwords that meet all the security requirements are often difficult
to remember, so they are reused across many sites. Users scribble them on sticky
Before Enabling notes. They weave in easily discoverable pet’s names, birthdays, and phone numbers.
Authentication Thankfully, organizations are starting to not just understand, but also support the
concept that while access should be hard for hackers, it needs to be easy for legitimate
(MFA) users. And, the best way to make that happen is with multi-factor authentication, or
MFA. MFA is a great way to secure your users’ apps and services from unauthorized
access. Here are some points to consider as you plan your deployment.
1. User education
You’re deploying multi-factor authentication to reduce security risks from password-
only access, but some users may see this as an inconvenience. They may be worried
that this process change will take up time they feel could be better spent elsewhere
- after all, entering an OTP or accepting a push notification does add time to the login
process. Nonetheless, it’s critical to ensure everyone — from management to IT teams
to security teams to end users — are aligned on why you’re making the shift to MFA. It is
important to achieve buy-in from the entire organization to ensure everyone plays a role
in keeping the company secure. Do this through education, so each user can appreciate
the security benefits they contribute to by taking this additional step. For example, a
common approach is to send out emails coming from IT on upcoming changes - well
in advance of when these changes will happen. Be sure to include screenshots, FAQs,
and contact information for employees to reach out for assistance.
Generally speaking, these deployment tips ensure both enhanced security and a great
end-user experience -
• For hardware that supports it, allow users to use biometrics as their second
factor (Windows Hello, Touch ID, etc). This simplifies end user experience and
also addresses scenarios where users may not have internet access
• Make at least two types of factors available for users, so that they have one as
a backup
• Allow users to self-service reset their factor (for example, reset an authenticator
app on a lost phone)
• Start your deployment right by only enabling strong factor types (mobile app
authenticators, push notifications, biometrics)
The SIM card in your phone essentially tells your phone which wireless carrier to
connect to, and what phone number to connect with. In a SIM swap/SIM hack
attack, a threat actor impersonates you and convinces the carrier that they are, in
fact, you. Ultimately, your phone number is then assigned to a new SIM card on a
different phone.
While SIM swapping/SIM hacking has been an issue for years, this attack type
became very publicized in 2019, when Twitter CEO Jack Dorsey’s own Twitter
account was victim to a group of vandals that convinced the wireless carrier tied
to his phone number to switch that number to a new phone in their possession.
In a SIM swap/SIM hack, threat actors do not need access to any of your physical
devices to gain access to your accounts - once your number has been switched to
a device in their possession, they can receive all SMS OTP messages tied to your
online accounts.
You’ve lost your phone — it’s annoying, but happens from time to time. But, what
happens when your phone number is connected to your banking apps, social media,
and more? In general, multi-factor authentication is considered a combination of two
pieces of evidence which prove you are who you say you are - a knowledge factor
(something you know), an inherent factor (something you are), or a possession factor
(something you have). Using a password and an SMS OTP as a factor is a combination
of knowledge and possession factors. But if you’ve lost your phone, in theory, you
should no longer be able to receive messages to validate your identity. However,
because we can now sync messages across multiple devices, even if you have lost
the device which should be considered your second factor, you still have access to
your accounts. This is considered insecure when you can forward text messages
to your email — which may have an insecure password, or if you’re using a VoIP
number that can be accessed on any device which may or may not have a PIN code.
Keep in mind that most of the common wireless providers allow you to view text
messages via your online account, within their web portal. If your account for the
web portal itself isn’t protected with a second factor, and if you are using an easily
guessed password which you use with many online accounts, a threat actor could
monitor your account for an SMS OTP message that you initiated for a banking app,
Facebook, etc, giving them access to those accounts.
Whitepaper Multi-Factor Authentication Deployment Guide 8
Unfortunately, SMS OTP is not the only form of authentication susceptible to social
engineering phishing attacks. Less secure factors like passwords and security
questions are equally susceptible. In a social engineering attack, a threat actor
posing as an employee from a service you trust convinces you to hand over your
account credentials, and in many cases, the SMS OTP sent to your device as well.
For example, if you get a call from your “bank” telling you that they need immediate
access to your account for security purposes, you may inadvertently give a threat
actor your username/password combination, as well as the SMS OTP code which
gets sent to your phone during the login process. Phishing attacks aren’t just specific
to email. You can receive a phishing text message as well, and if you inadvertently
type a username/password combination into a malicious website, the threat actor
could then use a few of the aforementioned attack types to take over your account.
While NIST recommends against using SMS for these reasons, ultimately you need
to perform your own risk assessment based on your users, use cases, and the data
being secured. After all, MFA with SMS is still better than no MFA at all.
It’s also important to audit the user account’s activity prior to the point in time when
the device was lost to note any unusual activity. If there is anything suspicious, consider
the possibility of a breach and escalate accordingly. Once the immediate security
concerns are handled, focus should shift to getting the employee back to work with a
replacement device or login method. For example, an alternative process like calling
the IT helpdesk to verify identity requirements can allow the employee to be productive
while replacement factors are implemented.
This way, your users do not need to wait for an additional hard token to be shipped to
them. This is also where end user communication becomes critical - ensure they have
the resources they need to get set up and troubleshoot. In the case of new employee
onboarding, some organizations will host virtual onboarding sessions and send setup
instructions to the employee’s personal email address, before they have access to
their corporate email.
Whitepaper Multi-Factor Authentication Deployment Guide 10
Multi-Factor Volumes have been written about how to design secure authentication for electronic
systems. In this brief, we provide some practical advice for people building multi-
Authentication factor authentication for their applications, based on our observations working with
engineering and product teams.
Three best practices
We explore three ways to increase the security of your MFA feature:
for engineering and
product leaders 1. Understand and manage the vulnerability of your account recovery flow
2. Protect your login flow from brute force attacks
3. D
esign to manage tradeoffs between risk, usability, and cost Throughout this brief
we assume that the password has been compromised, and examine the second-
factor through this lens
Involve an administrator
An administrator can in many scenarios implement a sophisticated high assurance
authentication method. In enterprise scenarios, companies will be in the best position
to authenticate members of their organization through shared secrets derived from
the content of the employee’s work or profile, the company, and human relationships.
Whitepaper Multi-Factor Authentication Deployment Guide 12
One notable approach is to ask an employee’s manager to authenticate the user and
then authorize IT to execute the MFA reset. In consumer scenarios, an administrator
will be able to interrogate a user across a large set of shared secrets. For example,
upon onboarding, consumer banking applications will collect a large set of obscure
personal details that become shared secrets for account recovery. Recent events in
the person’s history with the application or company can also constitute viable shared
secrets. The evaluation of a set of shared secrets can be automated via web or voice and
can in many cases provide better assurance than a human through lower vulnerability
to social engineering.
Conclusion
Roadmap to MFA Success
Why Okta Okta’s modern approach to identity management is uniquely positioned to help
businesses take control of both identity and multi-factor authentication to reduce
for MFA? data breaches. With Okta’s multi-factor authentication, you can:
Quickly enable MFA for your workforce Reduce the attack surface
and customers
• Automated provisioning and
• Deploy MFA quickly and easily with deprovisioning accelerates consistent
5,000 out of the box connections on onboarding while eliminating orphan
the Okta application Network accounts
• Extend coverage to on-premises • Extensible for custom applications
applications via support for RADIUS, via SCIM, SDK, and Okta’s API
RDP, ADFS, and LDAP, as well as • Complete lifecycle management
header-based auth and Kerberos via ensures the right level of access to
Okta Access Gateway the right applications with access
• Facilitate intelligent, contextual request workflows
access decisions based on device and
Enable rapid response to compromise
connection attributes
• Automated provisioning and
But, to protect against data breaches
deprovisioning accelerates consistent
in a comprehensive way, you need more
onboarding while eliminating orphan
than strong authentication. With Okta
accounts
it’s easy to:
• Extensible for custom applications
Centralize identity via SCIM, SDK, and Okta’s API
• Complete lifecycle management
• Reduce account management
ensures the right level of access to
complexity
the right applications with access
• Unify access for users to eliminate
request workflows
passwords while simplifying access
• Mitigate risk and reduce identity
sprawl by restricting access to
services via intelligent SAML
connections
About Okta
Okta is the leading independent provider of identity for the enterprise. The Okta
Identity Cloud enables organizations to securely connect the right people to the right
technologies at the right time. With over 6,500 pre-built integrations to applications
and infrastructure providers, Okta customers can easily and securely use the best
technologies for their business. Over 8,950 organizations, including 20th Century Fox,
JetBlue, Nordstrom, Slack, Teach for America and Twilio, trust Okta to help protect
the identities of their workforces and customers. To learn more, visit okta.com.