Exempting some users from authentication with a Whitelist
When you activate CTE Multifactor Authentication, all users attempting to log in to the CTE client must successfully pass through CTE Multifactor Authentication to gain entry to the MFA-enabled GuardPoints. However, there are specific exemptions to this rule. Users whose system services, or applications, initiate automatically during system boot-up cannot undergo authentication though CTE Multifactor Authentication, as Multifactor Authentication necessitates user interaction. To accommodate such cases, exempt these users from Multifactor Authentication enforcement within the Client Profile by including them in the user set exemption list. Typically, only system users responsible for running system services are included in this list. However, since many system applications operate under the root user, or even under normal application user accounts, you must also add these system administrator/application users to the list. These users form part of the user set, commonly referred to as a whitelist.
Caution
Be careful when adding a user to the whitelist. The exemption applies for the entire client. Users on this list can bypass Multifactor Authentication and access all MFA-enabled GuardPoints. If a system service, or application, accesses only one GuardPoint among multiple GuardPoints, Thales advises you to leave that specific GuardPoint without Multifactor Authentication enforcement.
Creating a User Set
See Creating User Sets for information on creating a User Set in a Policy Element.
Adding the User Set to the Client Profile
To add an Multifactor Authentication whitelist to the client profile:
-
Create your Client Profile if it is not already created.
-
Click on your client profile to open it.
-
Click Multifactor Authentication.
-
In the Select OIDC connection field, select the OIDC connection that you created.
-
In the Select the MFA exempted User Set field, select the User Set that contains the people/applications that are exempted from authorization.
-
Click Update.