![]() ![]() Users type in the name of a Duo factor or a passcode when prompted by the client application. Password and MFA, MFA only, "Password and passcode". Answer Yes, our Secure Access SSL VPN configuration works with the Pulse client. Password and MFA, MFA, "Password and passcode". Protocols support the following authentication methods: Protocol Must be in the same request, for example: Abcd1234,879890” or “ Abcd1234,SmS”. Password and Passcode: Password entered immediately followed by a passcode in a request.MFA Only: Instead of password, users enter either a one-time passcode (OTP), or one of EMAIL, SMS, CALL, PUSH (case insensitive).Password + MFA: Primary authentication using password, then the user is prompted to select factors to complete the authentication.* RADIUS supports three authentication methods: ![]() Supported when the string "CALL" is sent. Push can work with primary authentication with MFA as the push challenge is sent out-of-band. Supported, as long as challenge is avoided. If you do not see the DuoConnect item on Duo Desktops menu, make sure that you have both DuoConnect 2.0.2 or later and Duo Desktop or Duo Device Health 2.24.0. Supported when the string "EMAIL" is initially sent. Configuration on the Pulse Secure server for App VPN is no different than the configuration for Pulse Mobile Client connections. Supported - as long as challenge is avoided.įor example MFA only or "Password, passcode". Okta supports the following factors for RADIUS apps:Įxtensible Authentication Protocol - Generic Token Card (EAP-GTC)Įxtensible Authentication Protocol - Tunneled Transport Layer Security (EAP-TTLS)* Okta recommends that you enroll no more than eight factors at a given time. The size of the challenge message can be too large for the RADIUS prompt if you let users enroll too many factors. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |