MFA is becoming the security standard for app authentication. You can secure your app by adding second-factor authentication with CyberArk Identity MFA Widget. Users would be challenged with an additional authentication mechanism to log into the web apps.
For instance, Acme has an in-house primary authentication mechanism that authenticates the user with a username and password. Acme can secure the login to the web app by using CyberArk Identity's MFA widget for second-factor authentication.
Create authentication rule
Create an authentication rule that challenges the user to authenticate with MFA when the mobile app requests it. For steps and instructions for creating an authentication rule in the Admin Portal, refer to the following link.
To find your authentication Policies in the Admin Portal, navigate to Core Services > Policies > Authentication Policy.
Configure MFA Widget:
To find your authentication widgets in the Admin Portal, navigate to Web apps > Widgets. Refer to the following figures for an example.
- Setup OpenID Connect (OIDC) custom application in CyberArk Identity tenant
- Install the CyberArk Identity Java-angular sample app
- Setup the Java-angular sample app
Please refer to https://github.com/cyberark/identity-demo-angular/tree/main/angular/src/app/mfawidget to see how an MFA widget can be embedded into a Java-angular app
On the Home page of the sample app, Select MFA card as highlighted below and click on start.
In this scenario, the sample app uses an in-built database and stores the user in both the in-built database and CyberArk Identity.
Click on signup on the card mentioned above and signup the user. The user gets stored in both the in-built database and CyberArk Identity on signup.
Authenticate to the sample app by passing your username and password. This authentication is a simulation of a web application.
Once successful the user can login to the app.
Updated about 1 year ago