Skip to main content

ON PREMISES SOLUTIONS

Managing two-factor authentication for user accounts

By clicking a username in the Accounts page, you are able to check its two-factor authentication status (enabled or disabled) under the Login Security section and take certain actions.

Revoke trust for browsers and reset or disable 2FA

The following actions are available for two-factor authentication:

  • Reset all browsers. Use this option to revoke the trust of all browsers on all devices that skip the six-digit code when connecting to Control Center. After revoking, users who previously enabled the Trust this browser option on the GravityZone login page have to enter the authentication code again.

    To revoke the trust of all browsers:

    1. Enter your GravityZone password.

    2. Click the Revoke all browsers button.

    3. Confirm your action.

      After revoking all browsers, the user need to enter the six-digit code again when connecting to .

  • Reset or disable user's two-factor authentication. If a user with 2FA enabled has changed or wiped the device and lost the secret key:

    1. Under Login Security, enter your GravityZone password in the corresponding field.

    2. Click Reset 2FA (when 2FA is enforced) or Disable (when 2FA is not enforced).

      accounts-reset-2fa-on-premises-july2022.PNG
      accounts-disable-2fa-on-premises-july2022.PNG
    3. A confirmation message will inform you that two-factor authentication has been reset / disabled for the current user.

      After resetting 2FA when this feature is enforced, at login, a configuration window will prompt the user to configure again the two-factor authentication with a new secret key. For details on how to enable 2FA, refer to this topic.

    As GravityZone administrator, you can enforce 2FA and configure the interval for Control Center to trust the browsers used for logging in the Configuration > Miscellaneous page.

  • If the user has 2FA disabled and you want to activate it, you will need to ask the user to enable this feature from his account settings.

    Note

    If you have a company administrator account, you may turn two-factor authentication mandatory for all GravityZone accounts. For more information, refer to this section.

Important

The authentication app of choice (Google Authenticator, Microsoft Authenticator, or any two-factor TOTP (Time-Based One-Time Password Algorithm) authenticator - compatible with the standard RFC6238 combines the secret key with the device’s current timestamp to generate the six-digit code.

Be aware that the time-stamps on both device and the GravityZone appliance have to match for the six-digit code to be valid. To avoid any time-stamps synchronization issue, we recommend enabling the automatic date and time setting on the device.

To check the 2FA changes related to user accounts, access the Accounts > User Activity page and filter the activity logs using the following filters:

  • Area: Accounts

  • Action: Edited

For information about 2FA for your account, refer to Manage your account.

Enforce 2FA and configure interval for trusting browsers

In the Configuration > Miscellaneous page, you can enforce two-factor authentication and configure the interval for trusting browsers.

This is how you configure these settings:

  • Enforce two-factor authentication for all accounts. Enable this option to make 2FA mandatory for all GravityZone accounts. When logging in, users will be prompted to configure 2FA for their accounts and they will have to enter a six-digit code in addition to their credentials. Users can skip enabling 2FA only three times. At the fourth login attempt, they will not be able to connect to Control Center without two-factor authentication.

  • Users trust their devices. This option allows to trust the browsers used for connecting to Control Center. After enabling the Trust this browser check box on the login screen, users do not need to enter the six-digit code any longer until the interval expires.

    The maximum interval you can select is 90 days. When the interval expires, users must enter the six-digit code in addition to their credentials. When selecting Never, browsers are not trusted and users cannot skip two-factor authentication.

Configuration-miscellaneous-2fa-on-premises-july2022.png