{"id":6756,"date":"2020-07-09T18:38:59","date_gmt":"2020-07-09T15:38:59","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=6756"},"modified":"2021-02-17T20:01:27","modified_gmt":"2021-02-17T17:01:27","slug":"owa-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/owa-two-factor-authentication\/","title":{"rendered":"How to Add Two-Factor Authentication to Outlook Web App (OWA)"},"content":{"rendered":"\n<p>If you read this article, you probably know the answer to the \u201cwhat is OWA\u201d question. But just in case \u2014 OWA Outlook is a browser email client to access Microsoft Outlook without any on-premises installations for Exchange 2013, Exchange 2010 users. For Microsoft Outlook update for Microsoft Exchange 2016 it was rebranded as \u201cOutlook on the web\u201d. OWA Outlook online provides access not only to email, but to other personal information like calendar, contacts, and tasks, and is widely used by businesses all over the world. With such sensitive data involved, OWA two-factor authentication becomes imperative.<\/p>\n\n\n\n<p>We developed two products for Outlook OWA 2FA. The first product is <a href=\"https:\/\/www.protectimus.com\/owa\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Protectimus OWA<\/a>, developed specifically for Office OWA integration. The second solution is <a href=\"https:\/\/www.protectimus.com\/dspa\/index.php\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Protectimus DSPA<\/a> which adds 2FA directly to the repository (Active Directory, Lightweight Directory Access Protocol, databases) and thus adds MFA to everything linked to the business AD, LDAP, etc.<\/p>\n\n\n\n<p>Today we will give you an in depth look into both methods. We will describe their work, show you how to implement each solution and list the tokens that support them.<\/p>\n\n\n\n<h2 class=\"has-very-dark-gray-color has-text-color has-text-align-center has-vivid-green-cyan-color wp-block-heading\"><strong>Method 1. Use Protectimus OWA 2FA Plugin<\/strong><\/h2>\n\n\n\n<p>Our Exchange OWA plugin is designed to integrate Outlook 2-factor authentication for mail on Microsoft Exchange 2016, Exchange 2013 as well as 2019. Protectimus installation wizard finishes a Microsoft MFA setup in 15 min tops.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-background\" style=\"background-color: #269400;\" href=\"https:\/\/www.protectimus.com\/owa\/?ref=OWA-article\" target=\"_blank\" rel=\"noreferrer noopener\">Download Protectimus OWA installer and setup instructions<\/a><\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How it works<\/strong><\/h3>\n\n\n\n<p>With the plugin from Protectimus, OWA multi-factor authentication will be integrated with the OWA app only, nothing else. This method requires <a href=\"https:\/\/service.protectimus.com\/en\/register\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">registering to Protectimus cloud service<\/a> or downloading our <a href=\"https:\/\/www.protectimus.com\/service-and-platform\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">MFA platform<\/a> (contact out ), setting it up and starting the installation wizard. That is it.<\/p>\n\n\n\n<p>This product for OWA two-factor authentication runs either in cloud, or locally. The customer gets all the advanced features like geo and time filters, IP filters, analysis of the user environment etc. Every Protectimus token works with this plugin, and it supports third-party tokens as well.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Supported tokens<\/strong><\/h3>\n\n\n\n<p>All the MFA tokens are divided into software and hardware kinds. The divide is derived from the secret key (seed) implementation. Since we are focused solely on Microsoft Outlook Exchange login here, we won\u2019t delve into details on how 2FA works. But you can always read other articles on <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">our blog<\/a> for more info on various MFA specifics. For now let\u2019s just mention the tokens Protectimus OWA two-factor authentication supports:<\/p>\n\n\n<table class=\"has-fixed-layout\">\n<tbody>\n<tr>\n<td width=\"30%\"><strong>Token<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.protectimus.com\/slim-mini\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus Slim NFC<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6055\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/Protectimus-Slim-NFC.jpg\" alt=\"Programmable TOTP token Protectimus Slim NFC\" width=\"520\" height=\"347\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/Protectimus-Slim-NFC.jpg 520w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/Protectimus-Slim-NFC-300x200.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/Protectimus-Slim-NFC-321x214.jpg 321w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/Protectimus-Slim-NFC-140x94.jpg 140w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/p>\n<p><\/p>\n<\/td>\n<td>\n<ul>\n<li>Hardware device that looks like a credit card.<\/li>\n<li>Programmable secret key. Which means \u2014 the token can be reprogrammed.<\/li>\n<li>3-5 years battery life.<\/li>\n<li>Waterproof.<\/li>\n<li>$29.99\/token.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.protectimus.com\/protectimus-two\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus TWO<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6051 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/TOTP-token-Protectimus-Two.jpg\" alt=\"Classic TOTP token Protectimus Two\" width=\"593\" height=\"310\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/TOTP-token-Protectimus-Two.jpg 593w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/TOTP-token-Protectimus-Two-300x157.jpg 300w\" sizes=\"auto, (max-width: 593px) 100vw, 593px\" \/><\/p>\n<\/td>\n<td valign=\"top\">\n<ul>\n<li>Hardware token, slightly bulkier than Slim NFC.<\/li>\n<li>Secret key is hardcoded, which means the token can be used for one app\/website only.<\/li>\n<li>3-5 years battery life.<\/li>\n<li>Waterproof.<\/li>\n<li>Shockproof.<\/li>\n<li>$11.99\/item.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.protectimus.com\/protectimus-smart\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus SMART OTP<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6644 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart.jpg\" alt=\"Software OTP token Protectimus Smart OTP\" width=\"348\" height=\"348\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart.jpg 348w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-184x184.jpg 184w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\" \/><\/p>\n<\/td>\n<td valign=\"top\">\n<ul>\n<li>Software token \u2014 2FA app for iOS and Android.<\/li>\n<li>Protected with PIN.<\/li>\n<li>Can be used on multiple apps\/websites simultaneously.<\/li>\n<li>Free.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.protectimus.com\/protectimus-bot\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus BOT<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5306\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/07\/Protectimus-chatbot-token.png\" alt=\"Protectimus chatbot token\" width=\"173\" height=\"173\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/07\/Protectimus-chatbot-token.png 173w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/07\/Protectimus-chatbot-token-150x150.png 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/07\/Protectimus-chatbot-token-160x160.png 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/07\/Protectimus-chatbot-token-60x60.png 60w\" sizes=\"auto, (max-width: 173px) 100vw, 173px\" \/><\/p>\n<p><\/p>\n<\/td>\n<td valign=\"top\">\n<ul>\n<li>Software token.<\/li>\n<li>OWA auth OTPs are delivered via chatbots in Telegram, Facebook Messenger, Viber.<\/li>\n<li>Free.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.protectimus.com\/protectimus-mail\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus MAIL<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6817\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/07\/protectimus-mail.jpg\" alt=\"OTP token Protectimus Mail\" width=\"366\" height=\"337\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/07\/protectimus-mail.jpg 366w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/07\/protectimus-mail-300x276.jpg 300w\" sizes=\"auto, (max-width: 366px) 100vw, 366px\" \/><\/p>\n<\/td>\n<td valign=\"top\">\n<ul>\n<li>Software token.<\/li>\n<li>OTPs for OWA login are delivered via email. (The passwords have to be sent to different email clients, not OWA email)<\/li>\n<li>Free.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.protectimus.com\/protectimus-sms\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus SMS<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6818\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/07\/protectimus-sms.jpg\" alt=\"OTP token Protectimus SMS\" width=\"394\" height=\"320\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/07\/protectimus-sms.jpg 394w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/07\/protectimus-sms-300x244.jpg 300w\" sizes=\"auto, (max-width: 394px) 100vw, 394px\" \/><\/p>\n<\/td>\n<td valign=\"top\">\n<ul>\n<li>Software token.<\/li>\n<li>OWA webmail login one-time passwords are sent via SMS. With the on-premise option, any SMS service can be employed.<\/li>\n<li>$2 per user per month.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>As for the third party tokens \u2014 our OWA webmail 2FA supports any tokens that work on OATH standard algorithms. We support several of the most popular tokens from other OWA two-factor authentication providers, so the integration should not take too much effort on your part but you&#8217;ll still need a bit deeper knowledge of your token.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to set up Outlook Web App 2-factor authentication with Protectimus OWA<\/strong><\/h3>\n\n\n\n<p>First, get the OWA multi-factor authentication <a href=\"https:\/\/www.protectimus.com\/owa\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">installer<\/a>. Then register and sign in <a href=\"https:\/\/service.protectimus.com\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Protectimus cloud<\/a> service and follow these steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Add Resource. Only the Resource Name is obligatory, the rest of the parameters are optional.<\/li><li>Add Users. Add a user&#8217;s Login, other parameters are optional. The user Login has to be login@domain, where login is the username in &nbsp; &nbsp; &nbsp; Active Directory, and domain is the corporate domain.<\/li><li>Add Tokens. As you already know any OATH tokens may be used, but we will use <a href=\"https:\/\/www.protectimus.com\/protectimus-smart\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Protectimus Smart<\/a>.&nbsp;<\/li><li>Add the Token Name. Using the Protectimus app scan the QR with the seed encoded. Input the OTP code you see next and click Save.<\/li><li>Assign Tokens to Users. Return to the Users and match the tokens with the appropriate users: click Assign Token \u2014 Existing, select the required token, and click Assign.<\/li><li>Assign Tokens and Users to the Resource. Go to the Resources page, click the Assign button, choose a Token-User combination, and select the tokens that should be accredited to the resource.<\/li><li>Run the installation wizard as administrator. When you see the welcome message \u2014 click Next to proceed.<\/li><li>Accept the terms in the License Agreement after attentively reading them, push the \u201cNext\u201d button.<\/li><li>Choose the folder where you want the app installed, and press Next.<\/li><li>Add API URL, Login, API Key, and Resource ID.<ul><li>API URL: https:\/\/api.protectimus.com\/.<\/li><li>API Login: the email of your Protectimus Service account login.<\/li><li>API Key: you\u2019ll find it on the Profile page.<\/li><li>Resource ID: can be found on the Resources page.<\/li><\/ul><\/li><li>Click Next to continue.<\/li><li>Everything is ready. Click Install and finish the process.<\/li><li>Outlook web access two-factor authentication is enabled now.<\/li><\/ul>\n\n\n\n<p>Here\u2019s a video to illustrate the above steps:<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube aligncenter wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How to set up Microsoft Outlook Web App (OWA) two-factor authentication - Protectimus Ltd\" width=\"838\" height=\"471\" src=\"https:\/\/www.youtube.com\/embed\/NBh5UC1Hd6w?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"has-very-dark-gray-color has-text-color has-text-align-center wp-block-heading\"><strong>Method 2. Use Protectimus Dynamic Strong Password Authentication to enable OWA two-factor authentication through AD<\/strong><\/h2>\n\n\n\n<p>Unlike Protectimus OWA, <a href=\"https:\/\/www.protectimus.com\/blog\/active-directory-two-factor-authentication\/\">DSPA<\/a> was designed to add MFA to everything hooked up to Active Directory, which includes OWA Outlook Web App for Outlook Exchange 2010.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-background\" style=\"background-color: #269400;\" href=\"https:\/\/www.protectimus.com\/dspa\/?ref=OWA-article\" target=\"_blank\" rel=\"noreferrer noopener\">Download Protectimus DSPA overview and setup instructions<\/a><\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How it works<\/strong><\/h3>\n\n\n\n<p>After DSPA is deployed the users\u2019 passes in Active Directory, and with it in Outlook Exchange, get a second dynamic part in addition to the common user password.&nbsp;<\/p>\n\n\n\n<p>The dynamic password is a one-time password generated on the basis of TOTP algorithm, this means these OTPs expire in a few seconds or minutes. The passwords\u2019 lifespan can be set up by the admin and can be anything from a few seconds to hours.&nbsp;<\/p>\n\n\n\n<p>An Outlook Web Access password created with the dynamic component will be something like \u201cPasscode855511\u201d, where \u201cPasscode\u201d is the user&#8217;s static pass, and \u201c855511\u201d is the changing OTP added by the dynamic pass component.<\/p>\n\n\n\n<p>For Protectimus DSPA to work you will need Protectimus on premises solution (the price starts from $199\/month).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Supported tokens<\/strong><\/h3>\n\n\n\n<p>Since DSPA allows the admins to set the OTP lifetime as long as they like, the tokens, which will deliver those OTPs, have to support this feature as well. This pegs down the token choice significantly.<\/p>\n\n\n<table class=\"has-fixed-layout\">\n<tbody>\n<tr>\n<td width=\"30%\"><strong>Token<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.protectimus.com\/protectimus-smart\/\">Protectimus Smart OTP<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6644 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart.jpg\" alt=\"Software OTP token Protectimus Smart OTP\" width=\"348\" height=\"348\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart.jpg 348w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-300x300.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-150x150.jpg 150w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-160x160.jpg 160w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-240x240.jpg 240w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-60x60.jpg 60w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/06\/software-authenticator-protectimus-smart-184x184.jpg 184w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\" \/><\/p>\n<p><\/p>\n<\/td>\n<td>\n<ul>\n<li>MFA mobile app for iOS and Android.<\/li>\n<li>PIN protected.<\/li>\n<li>Can be used with multiple apps\/websites simultaneously.<\/li>\n<li>Free<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">\n<p style=\"text-align: center;\">Custom hardware tokens<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6051 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/TOTP-token-Protectimus-Two.jpg\" alt=\"Classic TOTP token Protectimus Two\" width=\"593\" height=\"310\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/TOTP-token-Protectimus-Two.jpg 593w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/02\/TOTP-token-Protectimus-Two-300x157.jpg 300w\" sizes=\"auto, (max-width: 593px) 100vw, 593px\" \/><\/p>\n<\/td>\n<td valign=\"top\">\n<ul>\n<li>You can opt for classic hardware tokens if you are ok with the 30-60 seconds OTP lifespan.<\/li>\n<li>Or you can order custom devices for your company. To do that <a href=\"https:\/\/www.protectimus.com\/contact-us\/\">chat with us<\/a>.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to integrate Outlook two-factor authentication applying DSPA<\/strong><\/h3>\n\n\n\n<p>Configuring Protectimus on-premise for AD, and Microsoft OWA alongside, is as easy and effortless as the Protectimus OWA setup:<\/p>\n\n\n\n<div class=\"schema-how-to wp-block-yoast-how-to-block\"><p class=\"schema-how-to-description\"><\/p> <ol class=\"schema-how-to-steps\"><li class=\"schema-how-to-step\" id=\"how-to-step-1594299728977\"><strong class=\"schema-how-to-step-name\">Install Protectimus MFA Platform.<\/strong> <p class=\"schema-how-to-step-text\"><a href=\"mailto:support@protectimus.com\">Request<\/a> the platform with DSPA and installation instructions from us.<\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1594299788894\"><strong class=\"schema-how-to-step-name\">Add users.<\/strong> <p class=\"schema-how-to-step-text\">On the Users tab, choose Add User. Then check the LDAP User box. The Login has to be the user&#8217;s AD Common Name. Each end-user needs an email address, an admin has to add them on this step.<img decoding=\"async\" alt=\"OWA two-factor authentication setup Protectimus DSPA - add user\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/07\/OWA-two-factor-authentication-setup-Protectimus-DSPA-add-user.jpg\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1594300035862\"><strong class=\"schema-how-to-step-name\">Create a resource.<\/strong> <p class=\"schema-how-to-step-text\">On the Resources tab, choose Add Resource. Check the LDAP box.<img decoding=\"async\" alt=\"OWA two-factor authentication setup Protectimus DSPA - add resource\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/07\/OWA-two-factor-authentication-setup-Protectimus-DSPA-add-resource.jpg\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1594300113938\"><strong class=\"schema-how-to-step-name\">Assign Users to the Resource<\/strong> <p class=\"schema-how-to-step-text\">Next, the Users are to be attached to the Resource. In the Resources tab, click Assign\u00a0 -> Users. Only LDAP users can be assigned to an LDAP resource.<img decoding=\"async\" alt=\"OWA two-factor authentication setup Protectimus DSPA -  assign users to the resource\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/07\/OWA-two-factor-authentication-setup-Protectimus-DSPA-assign-users-to-the-resource.jpg\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1594300168462\"><strong class=\"schema-how-to-step-name\">Enable Self-Service.<\/strong> <p class=\"schema-how-to-step-text\">Find and check \u201cEnable User\u2019s Self-Service for This Resource\u201d in the new resource. Come up with the URL for your end-users to access the page by adding a custom part to the link. If we add \u201cmywebowa\u201d, the link would be https:\/\/service.protectimus.com\/selfservice\/mywebowa<img decoding=\"async\" alt=\"OWA two-factor authentication setup Protectimus DSPA - activate self-service\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/07\/OWA-two-factor-authentication-setup-Protectimus-DSPA-activate-self-service.png\"\/><\/p> <\/li><li class=\"schema-how-to-step\" id=\"how-to-step-1594300203694\"><strong class=\"schema-how-to-step-name\">Make your Users create tokens via Self-Service.<\/strong> <p class=\"schema-how-to-step-text\">Each user has to create their own tokens and add their static passes to them. Give the link you came up with to each end-user. Ask them to sign in with their Common Name and the OTPs emailed to the addresses you added in the second step. Every user needs to register a New Token (let them know what time interval to choose) and to add their AD unchanging passcode.<img decoding=\"async\" alt=\"OWA two-factor authentication setup Protectimus DSPA - self-service page\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2020\/07\/OWA-two-factor-authentication-setup-Protectimus-DSPA-self-service-page.png\"\/><\/p> <\/li><\/ol><\/div>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Conclusions<\/strong><\/h2>\n\n\n\n<p>OWA intermedia security settings are not sufficient enough if you want your business OWA mail and everything connected to it to be truly secure. Both two-factor authentication outlook options we offer are good, which one to choose depends on your needs and the quantity of users you have. If you want to protect everything, not only web Outlook, and you have more than 200 users \u2014 opt for <a href=\"https:\/\/www.protectimus.com\/dspa\/index.php\">DSPA<\/a>. If all you need to protect is webmail OWA and the quantity of users is small \u2014 <a href=\"https:\/\/www.protectimus.com\/owa\/\">Protectimus OWA<\/a> is the way to go.<br>If after reading this article, you still have any questions on our Microsoft Outlook web app 2FA solutions, or you hesitate on which one to choose \u2014 do <a href=\"https:\/\/www.protectimus.com\/contact-us\/\">contact us<\/a>. We are here to help you protect your Microsoft Exchange Outlook web access.<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><strong>Read also:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-solutions-comparison-google-authenticator-vs-protectimus\/\">Two-Factor Authentication Solutions Comparison: Google Authenticator vs. Protectimus<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-for-windows\/\">Two-factor authentication for Windows 7, 8, 10<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/hardware-token-azure-mfa\/\">Hardware Tokens for Azure MFA<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/office-365-mfa-hardware-token\/\">Office 365 MFA Hardware Token<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/duo-vs-protectimus\/\">Duo Security vs Protectimus<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/2fa-chatbots-vs-sms-authentication\/\">2FA Chatbots vs. SMS Authentication<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/totp-tokens-protectimus-slim-nfc-faq\/\">TOTP Tokens Protectimus Slim NFC: FAQ<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/protectimus-mfa-financial-services\/\">Best Protectimus MFA Features for Financial Services Cybersecurity<\/a><\/li><li><a href=\"https:\/\/www.protectimus.com\/blog\/electronic-visit-verification-system\/\">Electronic Visit Verification with Hardware Tokens<\/a><\/li><\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>If you read this article, you probably know the answer to the \u201cwhat is OWA\u201d question. But just in case \u2014 OWA Outlook is a browser email client to access Microsoft Outlook without any on-premises installations for Exchange 2013, Exchange 2010 users. For Microsoft Outlook update for Microsoft Exchange 2016 it was rebranded as \u201cOutlook [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":6800,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[9,15,329],"tags":[16,12,1005,120,1218,1004,1219,421,99],"class_list":["post-6756","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-protectimus-products","category-rd","category-setup-guides","tag-2fa","tag-mfa","tag-microsoft","tag-multifactor-authentication","tag-owa","tag-protectimus-dspa","tag-protectimus-owa","tag-setup-guides","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=6756"}],"version-history":[{"count":54,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6756\/revisions"}],"predecessor-version":[{"id":7231,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/6756\/revisions\/7231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/6800"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=6756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=6756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=6756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}