{"id":76352,"date":"2023-06-05T13:11:27","date_gmt":"2023-06-05T17:11:27","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=76352"},"modified":"2023-09-12T11:01:14","modified_gmt":"2023-09-12T15:01:14","slug":"set-up-webauthn","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/set-up-webauthn","title":{"rendered":"Set up WebAuthn"},"content":{"rendered":"\n
Use Multi-Factor Authentication (MFA) with JumpCloud to secure user access to your organization\u2019s resources. This guide shows you how to set up WebAuthn multi-factor authentication (MFA) for JumpCloud users. WebAuthn MFA protects authentication to the User Portal, Single Sign On (SSO) applications, and password changes made from the User Portal. When you enable WebAuth MFA, users will see it as an option for MFA when logging into one of these resources.<\/p>\n\n\n\n
<\/p><\/div>
Give your users secure and convenient access to their resources with Push MFA. Learn more: JumpCloud Protect for Admins<\/a>.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n MFA secures access to a resource by asking a user to prove who they are with multiple factors. When MFA is enabled, a user proves who they are with something they know, like a username and password, something they have, like a security key, and something they are, like a fingerprint. When WebAuthn MFA is enabled, users authenticate to the JumpCloud User Portal with their username and password plus a security key or a device authenticator. <\/p>\n\n\n\n WebAuthn MFA is available in the following places:<\/p>\n\n\n\n <\/p><\/div> WebAuthn MFA with Touch ID is only supported by Google Chrome.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Any older security keys (including device authenticators) have been renamed legacy keys. You can rename or delete these keys, but can not add a new security key to this area. We recommend re-enrolling these keys as Security Keys or Device Authenticators and then deleting the original legacy key. However, users will not be blocked from continuing to use the legacy key.<\/p>\n\n\n\n Security keys you can use:<\/strong><\/p>\n\n\n\n <\/p><\/div> TOTP Security keys can’t be used as WebAuthn security keys.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n <\/p><\/div> On Windows devices, the authenticator being enrolled as a device authenticator must already be enrolled in Windows Hello, otherwise enrollment will fail.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n To add WebAuthn for a user:<\/strong><\/p>\n\n\n\n Important: If WebAuthn is the only MFA factor and an admin deletes the user\u2019s only security key, that user will be locked out of the User Portal. <\/p>\n\n\n\n In the Users page, use the Columns dropdown to add the MFA: WebAuthn and MFA: User Requirement columns to confirm which users have completed WebAuthn enrollment.<\/p>\n","protected":false},"excerpt":{"rendered":" Use Multi-Factor Authentication (MFA) with JumpCloud to secure user access to your organization\u2019s resources. This guide shows you how to […]<\/p>\n","protected":false},"author":204,"featured_media":0,"template":"","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"support_category":[2908,2854],"support_tag":[],"coauthors":[2838],"acf":[],"yoast_head":"\nWhat is WebAuthn MFA<\/h2>\n\n\n\n
\n
WebAuthn MFA Considerations<\/h2>\n\n\n\n
\n
\n
Legacy Keys (WebAuthn Considerations)<\/h2>\n\n\n\n
Security Key (WebAuthn) Considerations<\/h2>\n\n\n\n
\n
\n
\n
Device Authenticator (WebAuthn) Considerations<\/h2>\n\n\n\n
\n
\n
\n
Preparing Your Users<\/h2>\n\n\n\n
\n
\n
Enabling WebAuthn MFA<\/h2>\n\n\n\n
\n
\n
\n
Viewing Users’ WebAuthn Enrollment Status<\/h2>\n\n\n\n