Authentication Options
Copy link

Use the Authentication page to set global options for 2-factor authentication (2FA), SAML single sign-on (SSO), and IP address access restriction. This page is visible only for administrator users.

Configure 2-factor authentication
Copy link

You can set which methods of 2FA are available for user login, as well as how long an inactive user session will remain active.

To set 2FA options:

  1. From the Settings > Authentication page, 2FA section, select the 2FA methods to enable.
    You can change this setting later.
  2. Click Save changes.

To change the session timeout duration:

  1. From the Settings > Authentication page, set the session timeout period.
    You can change this setting later.
  2. Click Save changes.

Configure single sign-on
Copy link

You can integrate access to the Digital Risk Protection (Threat Command) through various single sign-on (SSO) platforms. Both IdP initiation and SP initiation are supported.

In addition, you can provision users directly using SAML Just In Time method (JIT) method (for Azure AD and Okta SSO only).

The configuration activities are performed by the Digital Risk Protection (Threat Command) administrator.

Continue with the platform that matches your configuration:

Restrict access to certain IP addresses
Copy link

You can restrict access to Digital Risk Protection (Threat Command) only to specified IP addresses.

To restrict which IP addresses can access Digital Risk Protection (Threat Command):

  1. From the Settings > Authentication  page, Access restriction section, click Add a new IP address.
  2. Type the IP address which is permitted to access.
    You can enter a range, for example: 172.16.16.255/24
  3. (Optional) You can add a description.
  4. Click Save.
  5. To add additional IP addresses, repeat this process.

The added IP addresses are permitted to access Digital Risk Protection (Threat Command).