Administrator Tasks for Multifactor Authentication
Using the Proper Filter
Note
The Multifactor Authentication feature requires the CTE VMLFS driver. This driver must be running in order for Multifactor Authentication to work.
-
All new installations of 7.3.0.x contain this driver. Type
fltmc
to verify. A table displays listing all current drivers.Filter Name Num Instances Altitude Frame WdFilter 4 328010 0 storqosflt 0 244000 0 wcifs 0 189900 0 vmlfs 4 142900 0 FileCrypt 0 141100 0 luafv 1 135000 0 npsvctrig 1 46000 0 Wof 1 40700 0 -
Agents upgraded from 7.2.0, and previous versions, may be using the vmfiltr driver. If the agent ran vmfiltr driver, then when you upgrade to 7.3.0, it will start the vmfiltr driver. If the previous agent ran the vmlfs driver, then when you upgrade to 7.3.0, it will start the vmlfs driver. Type the following to switch to the vmlfs driver:
User Authentication
Authentication is provided for the entire client and is enforced the first time a user opens a file. After the initial file opening, the user can perform read/writes to the file.
To authenticate, a user can login to MFA from the Windows system tray:
-
Click on the CTE icon in the System Tray.
-
Select Multi-Factor Authentication > Authenticate.
-
Login in to access the STA OIDC template.
After you log in, a message displays confirming your authentication and your access to the GuardPoint.
-
Close the Window to continue.
Note
If you logout, you disable your access to the GuardPoint.
Voradmin Commands
The MFA command group contains the following commands:
Syntax
voradmin mfa status
Displays the MFA information for a user.
Syntax
Example
Response
voradmin mfa config
Displays configuration information.
Syntax
Response
voradmin mfa check-connection
Allows the admin user to check the connection to the OIDC provider.
Syntax
Example
Response 1: Success
Response 2: Failure
voradmin mfa update-ports
Allows the administrator to update the OIDC ports.
- Updating the ports restarts the CipherTrust Transparent Encryption Multifactor Authentication application. Users must login to Multifactor Authentication again after the ports are updated.
Warning
If the OIDC-login-port is changed, then the redirect-URI for the OIDC application at the Multifactor Authentication provider must also be changed. It is specified in the format: http://127.0.0.1:<oidc-login-port>/auth/callback
. If redirect-URI is not changed, CipherTrust Transparent Encryption may fail to connect to the provider.
Syntax
Example
Response
voradmin mfa set-auth-expiry
Allows the admin to set an authentication expiry time.
Note
Changing authentication expiry clears all existing MFA logins. Users must login again.
Syntax
Example
Response