Time limited authentication with SMS - Twilio Tutorial
- UpdatedAug 1, 2024
- 5 minutes to read
- Xanadu
- Platform Security
Set up time limited authentication with MFA factors such as SMS using Twilio.
Before you begin
Role required: admin
- com.snc.authenticate.time_limited_authentication (Time Limited Authentication)
- com.snc.authentication.sms_mfa (Multi-factor authentication with SMS)
The tutorial instructions provided enable the admin to provide a link-based login with SMS as second factor (MFA) for users with a specific role.
After a successful configuration, the system generates a link, and then shares the link with the user through notification (Email/SMS) channel. Clicking the link, the user is prompted to specify the OTP sent to Email or SMS factor based on user role (configuration).
- TLA should always be followed by MFA and MFA should be enabled by admin using Adaptive Authentication for TLA login. To know more about how to configure MFA with Adaptive Authentication, see MFA (Multi-Factor Authentication) context.
- TLA should be used for the users who have limited privileges.
Procedure
-
Creating a Twilio configuration.
- Create a Twilio test account. For more information, see Twilio.
- Navigate to All > Notify > Administration > Twilio Direct Configuration.
- Provide the Account SID and Auth token (created from Twilio) and save the record.
Note: You can create your own provider configuration and use that for TLA. In this example, it is Twilio. To know more about how to create a MFA provider configuration, see Configure MFA Provider. -
Configuring and enabling Time limited authentication(TLA) record.
- Navigate to All > Time Limited Authentication Config records and click New.
-
On the form, fill the fields.
Table 1. Time Limited Authentication Properties Field Description Name Name of the record. One time use Enable to use the TLA link once. Expiry Specify the seconds for the link expiry. The default is 45 minutes. Failed Redirect Enter the URL to redirect users after a failed authentication. Single Sign-On Script Details of the SSO script that you want to use. Active Option to make the configuration active. Max login attempts Specify the number of attempts allowed with the generated TLA link for login. Un-check the One time use checkbox to provide the max number of attempts. External logout redirect Enter the URL to redirect users after logout. -
Click Submit.
- Navigate to All > Multi-Provider SSO > Administration > Properties and enable the Enable multiple provider SSO property and Save.
-
Allowing TLA to only a specific user persona using the post-authentication
context policy.
- Navigate to Roles and create a role. For example: remote_worker.
- Create a user with a valid email id and mobile number. To know how to create a user see, Create a user.
- Assign the role to the user. To know how to assign the role to the user, see Assign a role to a user.
-
To create a role filter criteria, navigate to All > Adaptive Authentication > Role Filter Criteria, create a new filter
remoteworkerrole and condition
Role is remote_worker.
- To add policy condition based on the deny policy context based on the IdP and role filter criteria, navigate to All > Adaptive Authentication > Post Authentication Context.
-
Click the information icon and Open the
Record.
-
In the Policy Input, click Edit and add the role
(remoteworkerrole) and Save.
- In the Policy Condition, add the condition for the policy input and Submit the record.
-
Configuring the step-up authentication policy - MFA context.
- Navigate to All > Multi-factor Criteria.
-
Select the Role based multi-factor
authentication and add the role under Multi-factor Roles
section and Update. In this example:
remote_worker.
- Navigate to All > Adaptive Authentication > MFA Context.
-
Make sure the following:
- Default Policy field is Step-up MFA Policy
- Step-Up MFA Policy is Step-up MFA Policy
-
Click the Information icon and Open
Record.
- On the Step-Up MFA Policy form, in the Policy Inputs, click Edit.
- Add the Role based multi-factor authentication to the list and Save. In this example, remoteworkerrole.
- In the Policy Condition, click Enforce MFA if Role based or User based MFA settings are true.
- In the Enforce MFA if Role based or User based MFA settings are true page, make sure Role Based MFA is true.
-
Enforcing MFA to use SMS as a MFA factor policy.
- Navigate to All > Adaptive Authentication > MFA Context.
- On MFA Context page, click MFA Factor Policies and click on policy Display SMS OTP as an MFA Factor Policy.
- Click Edit and add remoteworkerrole in the Policy Inputs.
-
Click Policy Conditions and create a Policy
condition.
-
Click Submit.
The TLA link generated and shared to the users assigned with remoteworkerrole as role will be promoted to use the SMS code as a second factor to login the instance.
-
Enabling the other required properties.
- Navigate to All > Multi-factor Authentication > Properties.
-
Enable the following check-boxes.
- Enable Multi-factor authentication
- Enable Multi-factor Authentication with SSO
- Save the record.
- Navigate to All > Adaptive Authentication > Authentication Policies > Properties.
- Enable the Enable Authentication Policy checkbox.
- Save the record.
-
Generating a TLA link – Example.
- Navigate to All > System Definition > Scripts – Background.
-
Use the following API by providing user sysid and config id.
var tla=new global.TimeLimitedAuthentication(); gs.info(tla.generateNonce("user_sysid", "config1_sys_id","IAR2"));
Note: The source (IAR2) is not a mandatory parameter. -
Query Parameter is returned as shown:
nonce=VCeinfboDt0M&glide_sso_id=b3277f1b44351110f8779b5a2d9909f3&user=3b0277d344351110f8779b5a2d99099a&source=IAR2
-
Create a URL in the below format:
https://<instance-url> /login_with_sso.do?uri=<encoded url>& nonce=2olIQSxdgkjs&glide_sso_id=0c15bf09c3711110c5ec4e483c40dd7a&user=62826bf03710200044e0bfc8bcbe5df1&source=IAR
- Click the URL, the following MFA screen is displayed for login.