Conditional "AllowPauseforDays" feature for specific Access Policies #312
Replies: 6 comments
-
Yes, I completely agree with you. This feature can and is default to inactive. Indeed, what should be done by default without the possibility of deactivating is to align with the ADFS KMSI. and to bypass the MFA if the user goes through the KMSI. Maybe for version 4.0 by the end of the year. regards |
Beta Was this translation helpful? Give feedback.
-
Hi @redhook62, thank you very much for your comment! Don't get me wrong. Having the ability to enable the "AllowPauseForDays" feature is a great improvement for this plugin and to be honest, my users don't want to work without it. But from a security perspective it shouldn't be possible to overrule the "Require users to provide credentials each time at sign-in" parameter within an access policy. If the access policy for an application has the option "Require users to provide credentials each time at sign-in" enabled:
Another feature which is not security related but could improve the usability: |
Beta Was this translation helpful? Give feedback.
-
One thing is certain, we do not have the possibility of intervening on Microsoft's pages, except to replace the authentication modes (which will certainly be an additional feature in the future). And I think that the "AllowPauseForDays" can only be active if the KMSI and the persistence of SSO are not activated, Another important point, which we are not considering and have always refused to do, namely: manage the triggering of MFA from a user or application "context". this MUST be managed at the ADFS level. regards |
Beta Was this translation helpful? Give feedback.
-
One thing is certain, we do not have the possibility of intervening on Microsoft's pages, except to replace the authentication modes (which will certainly be an additional feature in the future). And I think that the "AllowPauseForDays" can only be active if the KMSI and the persistence of SSO are not activated, Another important point, which we are not considering and have always refused to do, namely: manage the triggering of MFA from a user or application "context". this MUST be managed at the ADFS level. |
Beta Was this translation helpful? Give feedback.
-
Some details. Having retested the use of the KMSI, I can confirm several things to you
The thing we will do as indicated previously, if the KMSI ADFS is activated by the administrator, the suspension of the MFA will be inactive (whether this option has been activated or not), so at each forced request on a relying party, the login process /MFA will be enabled. If the KMSI ADFS is not activated, you will have the Global possibility to suspend the MFA and not by Relying Party with a particular configuration. So my recommendation right now is to enable ADFS KMSI if you want and disable "AllowPauseForDays". regards |
Beta Was this translation helpful? Give feedback.
-
Great, thank you very much for testing @redhook62!
|
Beta Was this translation helpful? Give feedback.
-
Initial situation:
Within the ADFS properties you have the choice to configure the KMSI (Keep Me Signed In) settings. These settings provide users with the ability to decide, whether or not they want to stayed logged in for an extended period of time. The ADFS MFA plugin provides a similar feature with the "AllowPauseForDays" option.
As an administrator you can enable the KMSI feature with PowerShell:
If you have enabled this feature, users get an additional checkbox while providing the first factor:
Additionally, if the ADFS MFA feature "AllowPauseForDays" has also been enabled, users have the option to not be prompted for the second factor for the configured time period (in this case 90 days):
Problem
For some applications it might be necessary to ask for the first and second factor each time the user wants to access this application (e.g. VPN client). To fulfil this requirement, the ADFS access policies provides you with the "Require users to provide credentials each time at sign-in" option:
If you enable this option within the corresponding access policy, the "Keep me signed in" checkbox gets removed:
But after providing the second factor, you still get the ability to trigger the "AllowPauseforDays" feature within the ADFS MFA plugin or, if you have selected this checkbox previously, you won't get prompted for the second factor at all.
In my opinion, the best workflow would be to also suppress the "AllowPauseforDays" option. If you set an access policy that triggers a new sign-in every time you access this application, you shouldn't be able to safe the second factor as well. Currently, it's only possible to enable/disable the "AllowPauseForDays" feature for all applications. There is no way to exclude particular apps from this rule. This behaviour might result into a security risk.
If you have any questions, please let me know.
Beta Was this translation helpful? Give feedback.
All reactions