Project Name: Multifactor Authentication For Users and Log Analysis
Project Name: Multifactor Authentication For Users and Log Analysis
Project Name: Multifactor Authentication For Users and Log Analysis
MULTIFACTOR AUTHENTICATION
FOR USERS AND LOG ANALYSIS
Introduction
Multifactor Authentication offers Endpoint for Windows logins. With Endpoint
MFA in place, users are first authenticated through Active Directory (AD)
domain credentials, and next through one of the supported authentication
techniques such as one-time passwords (OTPs) sent via SMS . So even if a
hacker steals user credentials, they still need access to the second factor: the
users mobile phone.
MFA Challenges
Technical challenges to consider:
- Hardware and Software requirements .
- Implementation, training and maintenance .
- Scalability , High availability and Disaster recovery .
- Post administration , device and user management .
- Reporting .
Business Challenges:
- The business thinks that there’s never any security breach ,there’s no need for it.
- Supporting feature already in place, are new one required?
- Ongoing maintenance and training.
Why do we need it?
- Prevent unauthorized users from logging into your account.
- Protect your identity.
- Protect your data.
- If username and password are compromised, MFA will protect from login.
- MFA protect from Phishing, Brute-force, Man in The Middle attack, Keylogger etc.
How it can help you?
Offline Access –
Offline Multi-Factor Authentication Secure On-Premise Hosting . No internet connection is needed.
MFA for Windows users-
Not connected to the LAN Protect access to any machine even when disconnected from the corporate
network.
MFA for All Users-
Including Privileged Accounts Protect workstation and server connections from even the most privileged
system and admin accounts.
MFA and Remote Desktop(RDP) Connections-
Enable MFA on all RDP logons, or for every RDP logon from outside the corporate network – including RD
Gateway connections.
How does MFA work?
It is important to clarify that there are two types of MFA:
Device MFA: An authentication process that implements MFA directly at the point of login to a
system.
Application MFA: An authentication process that implements MFA upon attempting to gain
access to one or more applications .
MFA works in roughly the same manner for both types. As the user attempts to gain access to a
particular resource, they are challenged to input multiple authentication factors, rather than just
one. The user credentials are then verified by a core identity provider (IdP) or directory services
platform. Once authenticated, the user gains access to the requested resource.
Benefits
- Improve security
- Decreasing identities becoming compromised
- Simplification on login process
- MFA is essential component of cybersecurity
Limitations
- Usability
- Cost
- Technical gaps
- Complexity
- Backup options
- Lack of bandwidth
- Varying risks
- Finding the right MFA solution
Result
Multi-factor authentication is designed to prevent unauthorized users from gaining access to an
account with nothing more than a stolen password. Users may be at greater risk of compromised
passwords than they realize, particularly if they use the same password on more than one
website. Downloading software and clicking on links in emails can also expose an individual to
password theft.
References
- Documentation of Adself service and Microsoft Active directory service
- Google.com
- https://ieeexplore.ieee.org/document/6997526
- https://transmitter.ieee.org/passwords-multi-factor-authentication-and-cybersecurity/
-VNI Cisco Global Mobile Data Traffic Forecast 2016–2021. White Paper, 2017. Available online:
https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-indexvn
i/complete-white-paper-c11-481360.pdf