Increase Security with Multi-factor Authentication
Upon your initial sign-in to an account using a new device or application, the MFA process requires more than just your standard login credentials. The typical routine involves entering your username and password, followed by the introduction of a second authentication element, called the "second factor."
The first time you sign in on a device or app, you enter your username and password as usual, then you get prompted to enter your second factor to verify your identity. For instance, alongside your password, users may be prompted to input a unique code delivered through their Authenticator App or via Text Message (SMS).
Incorporating MFA into your security practices, you add an extra layer of protection, making it more challenging for unauthorized entities to breach your accounts.
With the security features offered by KODE Labs, you have the power to customize the multifactor authentication (MFA) process to align seamlessly with your organization's unique needs. Safeguarding logins has never been more customizable or user-friendly.
Enabling and customizing MFA adds an extra layer of security by requiring users to provide a second form of identification.
To start this journey of customization, simply follow these straightforward steps to access the MFA management panel within Launchpad:
Go to Launchpad.
Select “Company” at the bottom of the main left bar.
Go to the “Authentication & Security” tab.
You will be prompted to the “MFA” page from where you can customize the MFA
to suit your organization’s needs.
Choose whether to enforce MFA for all users or grant them the flexibility to decide for themselves.
This excludes users that use SSO for authentication.
Choose available MFA frequency options for your organization. You can choose how often users are prompted for MFA during login.
Customizable password settings contribute to system security. Enforcing strong password policies, such as length requirements, character diversity, and regular password changes, reduces the possibility of unauthorized access.
Within this section, you have the flexibility to specify the rules that should be followed for password generation, whether it's for user account creation or password reset.
To customize the password policy, follow these steps:
Go to Launchpad.
Select “Company” at the bottom of the main left bar.
Go to the “Authentication & Security” tab.
Select the “Password” tab.
Password page helps you to secure your environment by giving you control over password details such as lifetime of password, the frequency of changing the password and what a password contains.
Password Complexity is a measure of how difficult a password is to guess.
There are 2 predefined password complexities.
Medium
High
You can customize your password complexity as well, by defining weather the password should include:
Uppercase letters (A through Z).
Base 10 digits (0 through 9).
Non-alphanumeric characters (special characters).
Non consecutive characters
Lockout Settings - are designed to temporarily restrict access to a user account after a specified number of unsuccessful login attempts.
Retries before lockout: You can set a threshold for the maximum number of unsuccessful login attempts allowed before an account is locked out.
Example: You can customize this setting to allow, for instance, five unsuccessful login attempts before the account enters a locked state.
Lockout Time and Unit: Once the specified threshold is reached, you can define a time period during which the account remains inaccessible.
Example: You can configure the lockout time to be 1 hour, during which the account will remain locked, while still allowing legitimate users to regain access promptly after the specified duration.
Password configs
Password history - refers to the practice of keeping a record of previously used passwords for user accounts. The purpose of keeping password history is to prevent users from reusing the same passwords, which can increase security by minimizing the risk of compromised accounts.
Password Expiry Time - Password expiry time is the duration after which a user is required to change their password.
You can set session and idle timeout values based on the specific needs for your application.
Set an idle and/or session timeout, by following these steps:
Go to Launchpad.
Select “Company” at the bottom of the main left bar.
Go to the “Authentication & Security” tab.
Select the “Timeout Settings” tab.
Session Timeout - represents the duration a user's session remains active after they log in. When this predefined period goes past without any user activity, the system automatically logs the user out to increase security and protect sensitive information.
Idle timeout - is a subset of session timeout, focusing on the period of user inactivity within an active session. If no user activity occurs during this designated timeframe, the system initiates a logout process.
No, by default, MFA is not enforced for users, and they are not prompted to set up MFA during login.
When specifically configured, only users logging in with Email & Password will be prompted to set up and complete MFA.
Yes, admins can configure various MFA options, such as requiring MFA every login, remembering for 7 or 30 days on known devices. Users will see these options during setup.
Yes, device fingerprints are generated on the first login, saved, and associated with user accounts for MFA validation.
Yes, changing the browser will prompt Multi-factor Authentication, regardless of the selected 7-day or 30-day frequency.
Removing cookies will trigger MFA, independent of the chosen frequency setting.
Yes, existing users will be prompted to set up MFA on their next login if MFA requirements are added.
When multiple users log in from one browser, each user maintains their own MFA validation settings, unaffected by other users’ settings, even in mixed modes of browsing.
Yes, users can configure MFA settings for their accounts, which are validated during login.
Users' MFA configurations will be updated according to the organization settings. Users will default to the minimum available option if a previously selected option is removed.
Users will be prompted for MFA verification after the session timeout, even if they have a valid MFA memory time.
Users will be prompted for MFA verification before the session timeout occurs.
Users will be prompted for MFA verification exactly at the session timeout.
Users will be prompted for MFA verification every time they log in.
Yes, an admin can reset MFA for a user, requiring them to set up MFA again on the next login.
Yes, an admin can disable MFA for a user, allowing new users to log in without MFA. Existing users will still be prompted for 2FA.
MFA should work seamlessly across different mobile devices and browsers.
Medium security level requires passwords to have a minimum of 8 characters, including at least one digit, one uppercase letter, and one special character.
High security level passwords must have at least 12 characters and include at least one digit, one uppercase letter, one special character, and no consecutive characters (uppercase, special characters, digits).
Yes, administrators can create custom password policies enforcing specific requirements like minimum length, and the inclusion of uppercase, lowercase, special characters, digits, and non-consecutive characters.
Lockout time can be configured, and after the specified time, users are allowed to retry password entry.
The system allows configuration of the number of retries before lockout. Users will be locked out after exceeding the configured number of retries.
Administrators can configure the password expiration time. Users will be prompted to change their password if it exceeds the configured expiration time.
Yes, the system checks passwords against breached or leaked databases and prevents users from using compromised passwords.
Users whose passwords exceed the configured expiration time will be prompted to change their password upon login.
The system enforces a minimum password length, typically not allowing configurations less than 8 characters.
The system can handle and accept passwords with the maximum allowed length, typically up to 64 characters.
Session timeout can be configured in days, and user sessions will log out automatically after the specified number of days of inactivity.
Session timeout can also be set in hours, with user sessions automatically logging out after the specified number of hours of inactivity.
No, the system prevents setting negative values for session timeout and displays an error message for invalid values.
Idle timeout can be configured in days, terminating user sessions automatically after the specified number of days of inactivity.
Similar to day configuration, idle timeout can be set in hours, with sessions ending after the specified number of hours of inactivity.
No, the system requires integer values for idle timeout configuration and will display an error message for non-integer values.