The Authentication & Security panel is available via Security Settings. There are three tabs: MFA, Password, and Timeout Settings.
Upon your initial sign in to an account using a new device or application, the MFA process requires more than just your standard sign in credentials. The typical routine involves entering your username and password, followed by the introduction of a second authentication element, called the "second factor."
The first time you sign in on a device or app, you enter your username and password as usual, then you get prompted to enter your second factor to verify your identity. For instance, alongside your password, users may be prompted to input a unique code delivered through their Authenticator App or via Text Message (SMS).
Incorporating MFA into your security practices, you add an extra layer of protection, making it more challenging for unauthorized entities to breach your accounts.
With the security features offered by KODE Labs, you have the power to customize the multifactor authentication (MFA) process to align seamlessly with your organization's unique needs. Safeguarding logins has never been more customizable or user-friendly.
Enabling and customizing MFA adds an extra layer of security by requiring users to provide a second form of identification. To view the MFA settings, select Security Settings > Authentication & Security.
You can choose whether to enforce MFA for all users or grant them the flexibility to decide for themselves. (This excludes users that use SSO for authentication.)
You can also choose how often users are prompted for MFA during sign in.
Customizable password settings contribute to system security. Enforcing strong password policies (such as length requirements, character diversity, and regular password changes) reduces the possibility of unauthorized access.
Within this section, you have the flexibility to specify the rules that should be followed for password generation, whether it's for user account creation or password reset.
The Password tab enables you to secure your environment by giving you control over password details such as lifetime of password, the frequency of changing the password, and what a password contains.
Password Complexity: Measure of how difficult a password is to guess.
There are two predefined password complexity settings: Medium and High.
Uppercase letters (A through Z).
Base 10 digits (0 through 9).
Non-alphanumeric characters (special characters).
Non consecutive characters
- Password history: Practice of keeping a record of previously used passwords for user accounts. The purpose of keeping password history is to prevent users from reusing the same passwords, which can increase security by minimizing the risk of compromised accounts.
- Password Expiry Time: Password expiry time is the duration after which a user is required to change their password.
In the Timeout Settings tab you can set session and idle timeout values based on the specific needs for your application.
Session Timeout: Duration a user's session remains active after they sign in. When this predefined period goes past without any user activity, the system automatically signs the user out to increase security and protect sensitive information.
Idle timeout: Period of user inactivity within an active session. If no user activity occurs during this designated timeframe, the system initiates the sign out process.
Session timeout can be configured in days, with user sessions automatically logging out after the specified number of days of inactivity.
Session timeout can also be set in hours, with user sessions automatically logging out after the specified number of hours of inactivity.
No, the system prevents setting negative values for session timeout and displays an error message for invalid values.
Idle timeout can be configured in days, terminating user sessions automatically after the specified number of days of inactivity.
Similar to day configuration, idle timeout can be set in hours, with sessions ending after the specified number of hours of inactivity.
No, the system requires integer values for idle timeout configuration and displays an error message for non-integer values.
Medium security level requires passwords to have a minimum of 8 characters, including at least one digit, one uppercase letter, and one special character.
High security level passwords must have at least 12 characters and include at least one digit, one uppercase letter, one special character, and no consecutive characters (uppercase, special characters, digits).
Yes, administrators can create custom password policies enforcing specific requirements like minimum length, and the inclusion of uppercase, lowercase, special characters, digits, and non-consecutive characters.
Lockout time can be configured, and after the specified time, users are allowed to retry password entry.
The system allows configuration of the number of retries before lockout. Users are locked out after exceeding the configured number of retries.
Administrators can configure the password expiration time. Users are prompted to change their password if it exceeds the configured expiration time.
Yes, the system checks passwords against breached or leaked databases and prevents users from using compromised passwords.
Users whose passwords exceed the configured expiration time are prompted to change their password upon login.
The system enforces a minimum password length, typically not allowing configurations less than 8 characters.
The system can handle and accept passwords with the maximum allowed length, typically up to 64 characters.
No, by default, MFA is not enforced for users, and they are not prompted to set up MFA during login.
When specifically configured, only users logging in with Email & Password are prompted to set up and complete MFA.
Yes, admins can configure various MFA options, such as requiring MFA every login, remembering for 7 or 30 days on known devices. Users see these options during setup.
Yes, device fingerprints are generated on the first login, saved, and associated with user accounts for MFA validation.
Yes, changing the browser prompts Multifactor Authentication, regardless of the selected 7-day or 30-day frequency.
Removing cookies triggers MFA, independent of the chosen frequency setting.
Yes, existing users are prompted to set up MFA on their next login if MFA requirements are added.
When multiple users log in from one browser, each user maintains their own MFA validation settings, unaffected by other users’ settings, even in mixed modes of browsing.
Yes, users can configure MFA settings for their accounts, which are validated during login.
Users' MFA configurations are updated according to the organization settings. Users default to the minimum available option if a previously selected option is removed.
Users are prompted for MFA verification after the session timeout, even if they have a valid MFA memory time.
Users are prompted for MFA verification before the session timeout occurs.
Users are prompted for MFA verification exactly at the session timeout.
Users are prompted for MFA verification every time they log in.
Yes, an admin can reset MFA for a user, requiring them to set up MFA again on the next login.
Yes, an admin can disable MFA for a user, allowing new users to log in without MFA. Existing users are still prompted for 2FA.
MFA should work seamlessly across different mobile devices and browsers.