Product documentation Docs
    • English
    • Deutsch
    • 日本語
    • 한국어
    • Français
  • More Sites
    • Now Community
    • Developer Site
    • Knowledge Base
    • Product Information
    • ServiceNow.com
    • Training
    • Customer Success Center
    • ServiceNow Support Videos
  • Log in

Product documentation

  • Home
How search works:
  • Punctuation and capital letters are ignored
  • Special characters like underscores (_) are removed
  • Known synonyms are applied
  • The most relevant topics (based on weighting and matching to search terms) are listed first in search results
Topics are ranked in search results by how closely they match your search terms
  • A match on the entire phrase you typed
  • A match on part of the phrase you typed
  • A match on ALL of the terms in the phrase you typed
  • A match on ANY of the terms in the phrase you typed

Note: Matches in titles are always highly ranked.

  • Release version
    Table of Contents
    • Now Platform administration
Table of Contents
Choose your release version
    Home Orlando Now Platform Administration Now Platform administration User administration Authentication Multifactor authentication (MFA) Configure multifactor authentication (MFA)

    Configure multifactor authentication (MFA)

    • Save as PDF Selected topic Topic & subtopics All topics in contents
    • Unsubscribe Log in to subscribe to topics and get notified when content changes.
    • Share this page

    Configure multifactor authentication (MFA)

    You can enable and customize MFA to meet your security requirements.

    Before you begin

    To learn more about MFA, see Enable multi-factor authentication (MFA) (instance security hardening) in Instance Security Hardening Settings.

    Role required: admin

    Procedure

    1. Navigate to Multi-factor Authentication > Properties.
    2. Configure these properties:
      Table 1. Multifactor authentication properties
      Property Description
      Enable Multi-factor authentication (glide.authenticate.multifactor) Option that enables users and administrators to use this feature. The default is enabled. To learn more about this property, see Enable multi-factor authentication (MFA) (instance security hardening) in Instance Security Hardening Settings.
      Number of times a user can bypass multi-factor authentication (glide.authenticate.multifactor.setup.bypass.count) Number of times that a user can choose to skip the setup of MFA. Your users can still log in to the instance even if they don't have their mobile device with them. If you disable this feature and then reenable it, the counter starts over again. The default is 3.
      The time in minutes, the one time code sent to user's email address is valid for (glide.multifactor.onetime.code.validity) Number of minutes that the reset code is valid. See Log on with multifactor authentication. The default is 10.
      Additional time in seconds for which the code will be valid to accommodate for the clock skew. Max value is 60 seconds. (glide.authenticate.multifactor.clock_skew) Number of additional seconds that the reset code is valid. The maximum is 60. The default is 10.

      The instance validates the code entered by the user against the single app-generated code that is generated at the current time. You can skew the time window with this property and allow one or more codes to be generated during a time window to be considered valid.

      The property's value is used in the following calculation: current time - x/2 and current time + x/2, where 'x' is the value of this property. If you use the value of 10, for example, the instance considers any codes that are generated by the app between the time range [the current time - 5 seconds] and [current time + 5 seconds] to be valid.

      Use this property to prevent log in issues where the user is unable to enter the correct code in the default time allotted.

      Enable Device Fingerprinting Set your instance to prompt MFA when a user logs in from a new device or browser. The default is yes.
      The Time in hours, the device will be remembered and MFA screen exempted. Time span in hours that a browser remembers an MFA login. MFA does not prompt a user for authentication during the specified time period. The default is 8 hours.
    3. Click Save.

    Tags:

    Feedback
    On this page

    Previous topic

    Next topic

    • Contact Us
    • Careers
    • Terms of Use
    • Privacy Statement
    • Sitemap
    • © ServiceNow. All rights reserved.

    Release version
    Choose your release version

      Configure multifactor authentication (MFA)

      • Save as PDF Selected topic Topic & subtopics All topics in contents
      • Unsubscribe Log in to subscribe to topics and get notified when content changes.
      • Share this page

      Configure multifactor authentication (MFA)

      You can enable and customize MFA to meet your security requirements.

      Before you begin

      To learn more about MFA, see Enable multi-factor authentication (MFA) (instance security hardening) in Instance Security Hardening Settings.

      Role required: admin

      Procedure

      1. Navigate to Multi-factor Authentication > Properties.
      2. Configure these properties:
        Table 1. Multifactor authentication properties
        Property Description
        Enable Multi-factor authentication (glide.authenticate.multifactor) Option that enables users and administrators to use this feature. The default is enabled. To learn more about this property, see Enable multi-factor authentication (MFA) (instance security hardening) in Instance Security Hardening Settings.
        Number of times a user can bypass multi-factor authentication (glide.authenticate.multifactor.setup.bypass.count) Number of times that a user can choose to skip the setup of MFA. Your users can still log in to the instance even if they don't have their mobile device with them. If you disable this feature and then reenable it, the counter starts over again. The default is 3.
        The time in minutes, the one time code sent to user's email address is valid for (glide.multifactor.onetime.code.validity) Number of minutes that the reset code is valid. See Log on with multifactor authentication. The default is 10.
        Additional time in seconds for which the code will be valid to accommodate for the clock skew. Max value is 60 seconds. (glide.authenticate.multifactor.clock_skew) Number of additional seconds that the reset code is valid. The maximum is 60. The default is 10.

        The instance validates the code entered by the user against the single app-generated code that is generated at the current time. You can skew the time window with this property and allow one or more codes to be generated during a time window to be considered valid.

        The property's value is used in the following calculation: current time - x/2 and current time + x/2, where 'x' is the value of this property. If you use the value of 10, for example, the instance considers any codes that are generated by the app between the time range [the current time - 5 seconds] and [current time + 5 seconds] to be valid.

        Use this property to prevent log in issues where the user is unable to enter the correct code in the default time allotted.

        Enable Device Fingerprinting Set your instance to prompt MFA when a user logs in from a new device or browser. The default is yes.
        The Time in hours, the device will be remembered and MFA screen exempted. Time span in hours that a browser remembers an MFA login. MFA does not prompt a user for authentication during the specified time period. The default is 8 hours.
      3. Click Save.

      Tags:

      Feedback

          Share this page

          Got it! Feel free to add a comment
          To share your product suggestions, visit the Idea Portal.
          Please let us know how to improve this content

          Check any that apply

          To share your product suggestions, visit the Idea Portal.
          Confirm

          We were unable to find "Coaching" in Jakarta. Would you like to search instead?

          No Yes
          • Contact Us
          • Careers
          • Terms of Use
          • Privacy Statement
          • Sitemap
          • © ServiceNow. All rights reserved.

          Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. Please try again later. You have been unsubscribed from all topics. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from this content Thank you for your feedback. Form temporarily unavailable. Please try again or contact  docfeedback@servicenow.com  to submit your comments. The topic you requested does not exist in the release. You were redirected to a related topic instead. The available release versions for this topic are listed There is no specific version for this documentation. Explore products Click to go to the page. Release notes and upgrades Click to open the dropdown menu. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Please try again with a smaller file. Please complete the reCAPTCHA step to attach a screenshot
          Log in to personalize your search results and subscribe to topics
          No, thanks Login