Follow the below steps to create a security policy and assign it to the user:
-
Login to the Admin OneLogin Portal.
-
Go to Security | Policies.
-
Create New Users Policy and under the MFA tab, check the OTP Auth Required and OneLogin SMS option.
-
To assign the policy that you created, go to the list of users under Users tab.
-
Select the user whom you want to authenticate using OneLogin SMS.
-
Under User section, add the mobile number for the user where the SMS will be sent by the service provider.
-
Go to the Authentication tab and update the policy under the User Security Policy option.
Follow the below steps to create and activate a OneLogin token:
-
Login to OneLogin portal with credentials whom you want to authenticate using OneLogin SMS.
-
Add the Security Factor and select the OneLogin SMS security factor. Confirm the SMS sent to the Mobile number added by administrator.
Enabling the e-mail token allows users in your organization to receive e-mail messages containing one-time passwords. To enable the e-mail token, use the properties of a Defender Security Policy. After enabling the e-mail token, make sure you assign the Defender Security Policy to the users you want. For more information, see Managing Defender Security Policies.
NOTE: To use Email Token, make sure that registry "useoneloginsmsprovider" is set to "0", if it exists.
To enable and configure the e-mail token
- On the computer where the Defender Administration Console is installed, open the Active Directory Users and Computers tool (dsa.msc).
- In the left pane (console tree), expand the appropriate nodes to select the container where the user object is located.
- In the right pane, double-click the user object, and then click the Defender tab in the dialog box that opens.
- Below the Tokens list, click the Program button.
- In the Select Token Type step, click to select the Software token option. Click Next.
- In the Select Software Token step, click to select the E-mail token option.
- Complete the wizard to configure the e-mail token for the user.
For more information about the wizard steps and options, see Defender Token Programming Wizard reference
You can configure Defender to use Symantec Validation & ID Protection (VIP) credentials for two-factor authentication of users within your organization. VIP credentials are security tokens allowing you to generate one-time passwords. VIP credentials can be implemented as security cards, hardware tokens, and software tokens for mobile phones and Windows-based computers.
When working with VIP credentials, Defender acts as a proxy server, redirecting authentication requests to the Symantec VIP Service, a cloud-based authentication solution.
Upon receiving an authentication request from a user who has a VIP credential assigned, Defender redirects the request to the Symantec VIP Service via HTTPS. The Symantec VIP Service validates the authentication request—for that, the user’s VIP credential must be properly registered with the Symantec VIP Service—and provides a response to Defender. If the user has been successfully authenticated by the Symantec VIP Service, Defender allows that user to access the protected resource.
To configure Defender for working with VIP credentials, you need to install a VIP certificate issued by Symantec, configure the correct URL to the Symantec VIP Service, and program VIP credentials for users in your organization.