Is it possible to incorporate Two-factor/ Multi-factor authentication with RSA Archer
Product Set: Archer Suite Product/Service Type: Archer (On-Premise)/ Archer (SaaS/Hosted) Version/Condition: 6.5 later Platform: Windows Server 2012 R2/ Windows Server 2016/ Windows Server 2019 Component/s:Single Singe on (SSO)/ Two-factor authentication/ Multi-factor authentication/ SAML 2.0
Possible scenarios that customers may need to configure the Two-factor authentication/ Multi-factor authentication
During the initial installation of Archer, customers want to configure the Two-factor authentication/ Multi-factor authentication with Archer
After installing Archer, customers have decided to use the Two-factor authentication/ Multi-factor authentication
The Archer platform supports Multi-factor authentication (MFA)through Security Assertion Markup Language (SAML) and Federated Single Sign-On Methods when paired with an Identity Provider (IdP) that provides multi-factor authentication, or when paired with any HTTP Header single sign-on solution that provides multi-factor authentication.
The Archer platform doesn’t nativelyprovide Two-factor/Multi-factor authentication by itself, and depends on being paired with a supported authentication solution that provides two-factor/multi-factor authentication for that functionality
Instead, Archer platform does support a variety of Single Singe-On (SSO) providers. Many of these providers support MFA. Archer platform supports them through Windows Authentication, Header Parameter, and Federation (SAML vis ADFS/WS-FED).
Multi-factor authentication continues to become a more common feature of identity management solutions. It is a feature of these Identity Provider (IdP) solutions rather than the Service Provider (SP) SSO configuration. If you are leveraging a multi-factor IdP solution that supports SAMLv2.0 you can achieve MFA with Archer.