Skip to main content
Nintex Community Menu Bar

Configure 2FA / OTP (Two Factor Authentication)

  • August 31, 2022
  • 0 replies
  • 91 views
  • Translate

MillaZ
Nintex Employee
Forum|alt.badge.img+21
  • Nintex Employee
  • 667 replies
Product: Kryon RPA
Product Version:v19.2 and above
Components: Kryon Admin
Article Contributors: Darren Cheng
This article will explain how to configure 2FA (Two Factor Authentication) in Kryon User Management Tool. Requires Kryon RPA 19.2 or above.

Prerequisites: You must be using Kryon RPA v19.2 or above.
Steps: Introduction
Enabling 2FA for All Users
Enabling 2FA for Selective Users

Introduction

Two factor authentication (2FA) is a common authentication mechanism used to increase system security by requiring users to authenticate not just with something they know (e.g. a password) but also something they possess (e.g. a device). Kryon RPA v19.2 and above supports 2FA for access to Console, Studio, Robots and the Kryon User Management Tool (KUMT).

Enabling 2FA for All Users

 Note: 2FA cannot be enabled for users synchronized via User Federation (Kerberos Single Sign On), only users using regular username/password authentication can take advantage of 2FA (i.e. those created via Kryon Admin).​

To enable 2FA for new users and existing users, follow these steps.

  • Log into KUMT using the "authadmin" account.
  • In the left menu click Authentication.
  • Click the Required Actions tab along the top.
  • For the "Configure OTP" line, ensure the checkbox is checked under the "Enabled" column.
  • Click the Flows tab along the top.
  • Select Browser from the dropdown.
  • Change the "OTP Form" requirement to Required.
  • Once this is done you will see "Success! Auth requirement updated" in a green dialog.
The next time any user tries to log in, they will be asked to set up 2FA and enter their code in their authenticator app of choice (e.g. Google Authenticator app) before they can log in. If they have already set up 2FA then they will only be asked to submit their code.

Enabling 2FA for Selective Users

It is commonly more useful to have selective 2FA because whilst you may need the extra security for Console, Studio and KUMT users, unattended robots should not be using 2FA to log into the Kryon platform, since they are by definition unattended and there is no human present to provide the code.

To accomplish the above, do the following:
  • Perform all the steps in the Enabling 2FA for All Users section above. However, instead of setting "OTP Form" to Required, set it to Optional.
  • Click on Users in the left sidebar.
  • Then, for each StudioConsole and KUMT user, do the following:
    • Edit the user by clicking Edit.
    • Under Required User Actions add a "Configure OTP" action.
    • Click Save.
  • The next time that user logs in, they will be asked to set up 2FA with their chosen authenticator app.
If you have any existing unattended robot users you wish to remove 2FA from, do the following:
  • Click on Users in the left sidebar.
  • Then, for each Unattended Robot user, do the following:
    • Edit the user by clicking Edit.
    • Click the Credentials tab.
    • Under Disable Credentials > Disableable Types, select the OTP type.
    • Click Save.

Unattended robots will now not be asked for a 2FA code when signing in.

Explanation

By setting "OTP Form" to OPTIONAL we are configuring the login screen to ask for a 2FA code only if it has already been configured by the user. If 2FA has not been configured, the login screen will permit the user to authenticate using username and password only.
More Information: None.
Did this topic help you find an answer to your question?

0 replies

Be the first to reply!

Reply


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie Settings