{"id":5787,"date":"2023-08-02T19:35:11","date_gmt":"2023-08-02T16:35:11","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=5787"},"modified":"2024-11-29T12:13:49","modified_gmt":"2024-11-29T09:13:49","slug":"active-directory-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/active-directory-two-factor-authentication\/","title":{"rendered":"Active Directory Two-Factor Authentication"},"content":{"rendered":"\n<p>It is hard to manage multiple users and systems, especially when there are not even hundreds, but thousands of them in a network. That\u2019s why businesses and organizations love Microsoft Active Directory. It allows for storing and managing all the information on the organization\u2019s systems, users, their credentials, sites and whatever else you might think of in a network, in one place.<\/p>\n\n\n\n<p>But you must agree that this much of fundamentally important information kept in one place makes Active Directory a tidbit for hackers. And simple password-username verification is far from sufficient to protect it all from attacks. This is why multifactor authentication is especially crucial for Active Directory security. Dynamic Strong Password Authentication (DSPA) solution from Protectimus has it well-cowered for you and your users. Adding the second layer of security to all systems and services attached to Active Directory in one go has never been easier.<\/p>\n\n\n\n<p>In this article, we will describe in detail how our <a href=\"https:\/\/www.protectimus.com\/dspa\/?ref=AD-2FA-article-button\">two-factor authentication solution for Active Directory<\/a> works, why ours is the easiest approach to Active Directory MFA, which methods of MFA can be used with it and how to get it running. We will also provide answers to the most asked questions on our solution for the Active Directory multi-factor authentication.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-background\" href=\"https:\/\/www.protectimus.com\/dspa\/?ref=AD-2FA-article-button\" style=\"background-color:#269400\">Download component for Active Directory 2FA<\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How it works<\/strong><\/h2>\n\n\n\n<p>Protectimus Dynamic Strong Password Authentication (DSPA) operates via direct Active Directory integration, it simply adds a 6-digit dynamic password to the static user password. These 6 symbols are essentially a one-time time-sensitive pass code that is generated with the <a href=\"https:\/\/www.protectimus.com\/blog\/otp-generation-algorithms-and-token-types\/\">TOTP algorithm<\/a>. This one-time password (OTP) is constantly changing.<\/p>\n\n\n\n<p>As a result of the ingenious integration, to get into a Microsoft AD attached account the user needs to enter a combined pass of this configuration \u2014 u$erp@ssword123456, the u$erp@ssword part here is the never-changing password devised by the user, admin, or generated by the system itself and the 123456 part is a dynamic OTP generated by Protectimus MFA token.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"679\" height=\"615\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/12\/Protectimus-Dynamic-Strong-Password-Authentication-Scheme1.png\" alt=\"Protectimus Dynamic Strong Password Authentication Scheme\" class=\"wp-image-5794\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/12\/Protectimus-Dynamic-Strong-Password-Authentication-Scheme1.png 679w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/12\/Protectimus-Dynamic-Strong-Password-Authentication-Scheme1-300x272.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/12\/Protectimus-Dynamic-Strong-Password-Authentication-Scheme1-610x553.png 610w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/figure>\n\n\n\n<p>The company\u2019s Active Directory server administrator can set the time-step, in which the OTP is changed, to 30 seconds or more (for example, for 600 seconds). So the DSPA part (those 6 digits OTPs) of the user passwords constantly change according to the timeline determined by the admin. Besides, teams of users can be made to be, or not be subject to the DSPA element in their static passwords; making the two-factor authentication AD required for the most valuable accounts only.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-for-windows\/\">Two-factor authentication for Windows 7, 8, 10<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Advantages of this approach to AD 2-factor authentication<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Advanced Active Directory security<\/h3>\n\n\n\n<p>Every regular 2-factor verification arrangement adds the second layer to the endpoints only. As a result, the hackers have a window to bypass 2FA and call the user directory up straightforward. Active Directory domain is easily called up through the Windows command prompt, so the hacker simply needs a user\u2019s credentials (login and password) to act maliciously under their name and no Active Directory 2-factor authentication will be there to stop him.<\/p>\n\n\n\n<p>Two-factor authentication Active Directory solution from Protectimus allows to enable the complete system protection and ensure no-one can get into AD without the additional dynamic OTP.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Ease of use and maintenance for AD administrators<\/h3>\n\n\n\n<p>Another issue that our solution for Active Directory two-factor authentication easily fixes is the need for multiple 2FA solutions for various accounts, services, and platforms. Traditionally the administrators have to implement different MFA solutions for different services that are in use by their company, then install this additional software on every user\u2019s device. Needless to say, all this software has to be maintained and regularly updated. Protectimus DSPA is a brilliant solution for this issue, integrating it with AD adds Active Directory one-time password to every single service and platform attached to AD.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/2fa-security-flaws\/\">2FA Security Flaws You Should Know About<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What authentication methods are available<\/strong><\/h2>\n\n\n\n<p>As has already been mentioned above \u2014 with DSPA the admin can set any time step for the dynamic Active Directory password reset &#8211; 30, 60 or even 3000 seconds. So the token that generates and delivers the OTP has to accommodate this feature too. Currently, there are two methods of two-tier authentication with DSPA available \u2014 2FA mobile application Protectimus Smart OTP and custom hardware tokens. The third one \u2014 chatbots, is currently in the works and will be released soon.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. 2FA app<\/h3>\n\n\n\n<p>Our free <a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">2FA application<\/a> Protectimus Smart OTP is available for both Android and iOS and can be used not only for 2-factor authentication Active Directory but for other sites and services protection too. The app allows for setting the OTP change schedule to multiple units of 30 seconds, so you can set it to 30, 60, 90, etc. which makes it the best option for OTP delivery for MFA Active Directory.<\/p>\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-4-3 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Protectimus Smart OTP - How to Enroll OTP Token with Custom Timestep\" width=\"838\" height=\"629\" src=\"https:\/\/www.youtube.com\/embed\/5J9u6KuZp10?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Hardware tokens<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.protectimus.com\/tokens\">Classic hardware tokens<\/a> for two-factor authentication come with factory-applied time-lag for the password change, it can be 30 or 60 seconds. Hardware tokens for 2FA Active Directory with any other timestep are available as custom orders only. The price for these custom tokens is a bit higher than those we have for order on the website, chat with us to learn more.<\/p>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to set it up<\/strong><\/h2>\n\n\n\n<div class=\"schema-how-to wp-block-yoast-how-to-block\"><p class=\"schema-how-to-description\">Configuring Protectimus platform for Windows Active Directory protection is rather easy and straightforward:<\/p> <ol class=\"schema-how-to-steps\"><li class=\"schema-how-to-step\" id=\"how-to-step-1576056368204\"><strong class=\"schema-how-to-step-name\">Install Protectimus on-premise platform and the DSPA component.<\/strong> <p class=\"schema-how-to-step-text\">Contact us via <a href=\"mailto:support@protectimus.com\">support@protectimus.com<\/a> to request the platform with the DSPA component for download.<\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1576056401348\"><strong class=\"schema-how-to-step-name\">Add users.<\/strong> <p class=\"schema-how-to-step-text\">Make sure to check the LDAP User checkbox at the bottom. The user Login used here must match the Common Name in AD. It\u2019s also required to specify the Email Address for each user.<img decoding=\"async\" alt=\"AD two-factor authentication setup with Protectimus DSPA - Add Users\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/12\/AD-two-factor-authentication-setup-Protectimus-DSPA-add-user-1.jpg\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1576056410254\"><strong class=\"schema-how-to-step-name\">Create a resource.<\/strong> <p class=\"schema-how-to-step-text\">Here too, make sure to check the LDAP checkbox at the bottom.<img decoding=\"async\" alt=\"Active Directory two-factor authentication setup with Protectimus DSPA - Add Resource\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/12\/AD-two-factor-authentication-setup-Protectimus-DSPA-add-resource-1.jpg\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1576056424362\"><strong class=\"schema-how-to-step-name\">Assign Users to the Resource.<\/strong> <p class=\"schema-how-to-step-text\"><img decoding=\"async\" alt=\"Active Directrory 2FA setup with Protectimus DSPA - Assign users to the resource\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/12\/AD-two-factor-authentication-setup-Protectimus-DSPA-assign-users-to-the-resource-1.jpg\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1576056431688\"><strong class=\"schema-how-to-step-name\">Activate Self-Service.<\/strong> <p class=\"schema-how-to-step-text\">Clicking on the resource name you created. Go to the Self-Service tab and click \u201cEnable User&#8217;s Self-Service for This Resource\u201d.You will be asked to specify the part of the address at which the Self-Service will be available to your users? For example, if you enter \u201cprotectimus\u201d, your Self-Service address will be https:\/\/service.protectimus.com\/selfservice\/protectimus<img decoding=\"async\" alt=\"Active Directory Two-factor Authentication setup with Protectimus DSPA - Activate self-service\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/12\/AD-two-factor-authentication-setup-Protectimus-DSPA-activate-self-service-1.png\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1576056446440\"><strong class=\"schema-how-to-step-name\">Give this link to your users to create tokens and static passwords.<\/strong> <p class=\"schema-how-to-step-text\">Users will need to login to the self-service page using their Logins (CN) from step 2 and the OTPs that will be sent to emails you also specified in step 2.<br\/>On the Self-Service page, the users will be asked to Register New Token (the administrator should inform the user what time step to set up) and to Create a Password (the password must match their AD static password).<img decoding=\"async\" alt=\"Active Directory two-factor Authentication setup with Protectimus DSPA - self service\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/12\/AD-two-factor-authentication-setup-Protectimus-DSPA-self-service-page-1.png\"\/><\/p> <\/li><\/ol><\/div>\n\n\n\n<p><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/hardware-token-azure-mfa\/\">Hardware Tokens for Azure MFA<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>FAQ on Active Directory two-factor authentication <\/strong><\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1576056487070\"><strong class=\"schema-faq-question\">How<strong> much does it cost?<\/strong><\/strong> <p class=\"schema-faq-answer\">The price depends on the number of users. The minimal price is $199 for up to 181 users.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1576056502967\"><strong class=\"schema-faq-question\">Where<strong> can I configure 2FA with the Protectimus DSPA component?<\/strong><\/strong> <p class=\"schema-faq-answer\">As we\u2019ve already mentioned \u2014 DSPA operated through direct AD integration, and as such it allows to protect any system attached to AD. Among these are OWA, ADFS, Azure, Windows, Office 265, Jira, etc.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1576056536540\"><strong class=\"schema-faq-question\">What do I need to start<strong> testing it?<\/strong><\/strong> <p class=\"schema-faq-answer\">To start testing install and run the Protectimus MFA platform and integrate it with your AD. The minimum tech requirements are Java (JDK version 8), PostgreSQL DBMS, ver10 or later. Contact support@protectimus.com for the installation package and detailed instructions.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1576056549764\"><strong class=\"schema-faq-question\">Does it work only for AD or also for other databases?<\/strong> <p class=\"schema-faq-answer\">Protectimus DSPA allows you to add two-factor authentication directly in any database or user directory, including Active Directory, LDAP, etc.<\/p> <\/div> <\/div>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Read more:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.protectimus.com\/blog\/duo-vs-protectimus\/\">Duo Security vs Protectimus<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/4-reasons-two-factor-authentication-isnt-a-panacea\/\">4 Reasons Two-Factor Authentication Isn\u2019t a Panacea<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/time-drift-in-totp-hardware-tokens\/\">Time Drift in TOTP Hardware Tokens Explained and Solved<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/electronic-visit-verification-system\/\">Electronic Visit Verification with Hardware Tokens<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/digital-security-risks-fintech\/\">10 Steps to Eliminate Digital Security Risks in Fintech Project<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/keycloak-multi-factor-authentication-hardware-tokens\/\">Keycloak Multi-Factor Authentication With Hardware Tokens<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/sophos-2fa-with-hardware-tokens\/\">Sophos 2FA with Hardware OTP Tokens<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/2fa-chatbots-vs-sms-authentication\/\">2FA Chatbots vs. SMS Authentication<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/office-365-mfa-hardware-token\/\">Office 365 MFA Hardware Token<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">Man In The Middle Attack Prevention And Detection<\/a><\/li><\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>It is hard to manage multiple users and systems, especially when there are not even hundreds, but thousands of them in a network. That\u2019s why businesses and organizations love Microsoft Active Directory. It allows for storing and managing all the information on the organization\u2019s systems, users, their credentials, sites and whatever else you might think [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":5812,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[9,15],"tags":[16,1046,1048,12,1050,120,476,194,1052,99,436],"class_list":["post-5787","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protectimus-products","category-rd","tag-2fa","tag-active-directory-en","tag-azure-mfa-en","tag-mfa","tag-microsoft-en","tag-multifactor-authentication","tag-office-365-en","tag-protectimus-en","tag-protectimus-dspa-en","tag-two-factor-authentication","tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/5787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=5787"}],"version-history":[{"count":18,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/5787\/revisions"}],"predecessor-version":[{"id":7344,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/5787\/revisions\/7344"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/5812"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=5787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=5787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=5787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}