GenAuth DocsDocuments
Concepts
User Guide
Development Integration
AgentAuth
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Concepts
User Guide
Development Integration
AgentAuth
Metadata
Development Integration
Multi-tenant (beta)
Console Documentation
Multi-tenant Console
Tenant Console
Saas Application Demo
Old version
User Guide
  • Quick Start

  • Authentication

  • Access Control

  • Authorization

  • Adaptive MFA

  • User Account Management

  • User Directory Management

  • Applications

  • Become a Federation Authentication Identity Provider

  • Connect External Identity Providers (IdP)

  • WeChat Ecosystem Full Scenario Capabilities

  • Migrate Users to GenAuth

  • Security Settings

  • Branding

  • Automation

  • Audit Logs

  • Setting

  • FAQ

¶ Adaptive MFA orchestration/policy configuration instructions

¶ Create adaptive MFA security orchestration through templates

Create adaptive MFA security orchestration through templates In the Identity Automation module, click New Workflow and find the "Adaptive MFA Security Policy" module to create an adaptive MFA security orchestration workflow through a template. The template has two modes:

  • API mode: suitable for adaptive MFA scenarios
  • Event stream mode: used for continuous adaptive MFA scenarios

¶ Enter MFA security orchestration-API mode after creating through template

Enter MFA security orchestration-API mode after creating through template

MFA security policy-API mode is a security orchestration flow consisting of HTTP request, configuration policy, execution policy engine, and return trigger MFA data. It is used for adaptive MFA scenarios and can trigger security orchestration workflows through HTTP requests, calculate user risks according to configuration policies, and return trigger MFA data according to calculation results

¶ HTTP request

HTTP request is used as the trigger of MFA security policy flow. Whenever a new HTTP request is generated, the workflow will be triggered

¶ Configure policy

In the configuration policy node, you can reference the policy orchestration function preset by GenAuth, or create a new custom policy orchestration function and then reference it. The policy orchestration function can receive the input data of the UEBA change event of the previous node, flexibly define the algorithm strategy, and output the corresponding return value of the configuration, which is given to the subsequent node execution policy engine for use

¶ Execution policy engine

In the execution policy engine node, you can assemble the return value of the adaptive MFA security policy referenced in the configuration policy, such as the policy judgment result, and then configure the conditional expression (or combination of conditional expressions) to perform the calculation of the policy judgment

¶ Return trigger MFA data

When the conditions (groups) of the execution policy engine node are met, it will enter the return trigger MFA data node. In the return trigger MFA data node, you can configure which MFA authentication method needs to be triggered, and you can flexibly configure the custom return value

¶ Enter MFA security orchestration-event flow mode after template creation

Enter MFA security orchestration-event flow mode after template creation

MFA security policy-event flow mode is a UEBA change event, configuration policy, execution policy engine, and release MFA The security orchestration flow composed of events is used for continuous adaptive MFA scenarios. It can continuously subscribe to UEBA events, calculate user risks according to the configuration policy, and publish specific MFA events based on the calculation results

¶ UEBA change event

The UEBA change event is used as a trigger for the MFA security policy flow. Whenever a new UEBA event is generated, the workflow will be triggered

¶ Configure policy

In the configuration policy node, you can reference the policy orchestration function preset by GenAuth, or create a new custom policy orchestration function and then reference it. The policy orchestration function can receive the input data of the UEBA change event of the previous node, flexibly define the algorithm strategy, and output the corresponding return value of the configuration, which is given to the subsequent node execution policy engine for use

¶ Execution policy engine

In the execution policy engine node, you can assemble the return value of the adaptive MFA security policy referenced in the configuration policy, such as the policy judgment result, and then configure the conditional expression (or combination of conditional expressions) to perform the calculation of the policy judgment

¶ Publish MFA event

When the conditions (groups) of the execution policy engine node are met, it will enter the publish MFA event node. In the publish MFA event node, you can configure which MFA authentication method needs to be triggered, and you can flexibly configure the custom return value

¶ UEBA data object module configuration

When using MFA security orchestration-event flow mode, you also need to create a UEBA data object module in Settings-Data Object Management ![### UEBA Data object module configuration The specific user data field list is as follows The specific user data field list is as follows

Specific field list reference:

NameExternal identifierExplanationGeneration method
----------------Application ID
appIdRequest date
requestDateip
ipRequest cityGenerate based on IP resolution
cityRequest provinceGenerate based on IP resolution
provinceRequest countryGenerate based on IP resolution
countryUser agent
uaDevice typeGenerate based on UA ​​resolution
deviceTypeDevice systemGenerate based on UA ​​resolution
systemTypeBrowserGenerate based on UA ​​resolution
browserTypeUser unique identifierThe unique ID of the user in the business systemBusiness system must be transmitted
originalIdentityBehavior typeBusiness system optional (recommended)
behaviorTypeBehavior resultBusiness system optional (recommended)
behaviorResultResource typeUser operation resource typeBusiness system optional (recommended)
resourcesTypeOperation typeUser operation type on resourcesBusiness system optional (recommended)
actionTypeAuthentication methodBusiness system optional (recommended)
loginTypeCustom fieldCustom fieldBusiness system optional (recommended)

¶ Configure adaptive MFA security policy

Configure adaptive MFA security policy

Adaptive MFA security policy is a security policy flow consisting of configuration input parameters, data filtering, data statistics, policy judgment, and configuration return value. It is used in adaptive/continuous self-use MFA scenarios. It can define the parameters for calculation input, filter data, statistics, make policy judgments, and finally output the policy calculation results. Adaptive MFA security policies can be referenced by adaptive MFA security orchestration workflows to obtain policy calculation results of behavioral data, thereby achieving flexible orchestration of MFA

¶ Configuring input parameters

Configuring input parameter nodes can flexibly define the parameters and data types received by adaptive MFA security policies

¶ Data filtering

Data filtering nodes can configure filtering conditions based on the data input by the previous order, and pass the data that meets the conditions to the back

¶ Data statistics

Data statistics nodes can configure data statistics conditions after receiving data from the previous order node, and can set the statistical cycle, statistical field and statistical type, and output statistical results based on the configuration of statistical conditions

¶ Policy judgment

Policy judgment nodes can configure policy judgment conditions based on the data input by the previous order node and the results of data statistics, and output policy hit results based on the conditions of policy judgment

¶ Configuring return values

Configuring return value nodes can assemble the output results of the previous order node, including configuring the data fields of the input parameters, the statistical results of data statistics, the policy results of policy judgment, and the ability to customize any return value

¶ For more information about functions, please refer to

  • GenAuth Adaptive MFA Overview
  • Integrate MFA based on GenAuth Guard login component
  • Transform existing IAM/IDaaS/authentication systems to integrate GenAuth adaptive MFA capabilities
  • Advanced MFA: Continuous Adaptive Multi-Factor Authentication (CAMFA) Guide
  • Create adaptive MFA security orchestration through templates
  • Enter MFA security orchestration-API mode after creating through template
  • Enter MFA security orchestration-event flow mode after template creation
  • Configure adaptive MFA security policy
  • For more information about functions, please refer to

User identity management

Integrated third-party login
Customized authentication process

Enterprise internal management

Single sign-on
Multi-factor authentication
Permission management

Developer

Development Documentation
GitHub (opens new window)

Company

official@genauth.ai
16th Floor, Building B, Beichen Century Center, Chaoyang District, Beijing (Total)
Room 406, 4th Floor, Block B, No. 200, Tianfu Fifth Street, High-tech Zone, Chengdu (Branch)

© Beijing Steamory Technology Co., Ltd.