{"id":84405,"date":"2023-06-05T13:10:42","date_gmt":"2023-06-05T17:10:42","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=84405"},"modified":"2024-11-15T11:57:16","modified_gmt":"2024-11-15T16:57:16","slug":"enable-totp-mfa-for-devices","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/enable-totp-mfa-for-devices","title":{"rendered":"Enable TOTP MFA for Devices"},"content":{"rendered":"\n
JumpCloud gives organizations the power to layer Multi-Factor Authentication (MFA) on top of nearly any resource you need to secure: Windows, Mac, Linux, applications, networks, infrastructure and more.<\/p>\n\n\n\n
<\/p><\/div>
If you’d like to use the JumpCloud Protect Push MFA mobile app for your MFA needs, see Configure Push MFA<\/a> and Users: JumpCloud Protect<\/a> to learn more.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Prerequisites<\/strong>:<\/p>\n\n\n\n Considerations<\/strong>: <\/p>\n\n\n\n <\/p><\/div> Internet connectivity isn’t required to use TOTP MFA on devices.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Before you can require your\u00a0users to use TOTP MFA to log into their JumpCloud device, you have to complete two procedures:\u00a0<\/p>\n\n\n\n To enable TOTP MFA at the org level:<\/strong><\/p>\n\n\n\n Any device in your org for which MFA has been enabled will now require TOTP MFA. Enable MFA on the devices manually by following the steps below.<\/p>\n\n\n\n To enable TOTP MFA on your devices:<\/strong><\/p>\n\n\n\n Once devices are enabled, users need to be enabled and they need to enroll in TOTP MFA. See Configure TOTP MFA for User Accounts<\/a> to learn more.\u00a0<\/p>\n\n\n\n See these articles to learn more about enabling TOTP MFA for individual devices:<\/p>\n\n\n\n <\/p><\/div> To see your users’ experience when logging in with TOTP, see JumpCloud Protect for End Users<\/a>.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Considerations<\/strong>:<\/p>\n\n\n\n To enable MFA for SSH on a Linux system<\/strong>:<\/p>\n\n\n\n <\/p><\/div> You can enable MFA for multiple devices from the Devices tab by clicking more actions<\/strong> and choosing Enable MFA<\/strong>.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Considerations<\/strong><\/p>\n\n\n\n To enable MFA for a Mac Device<\/strong>:<\/p>\n\n\n\n <\/p><\/div> You can enable MFA for multiple devices from the Devices tab by clicking more actions<\/strong> and choosing Enable MFA<\/strong>.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Considerations<\/strong>:<\/p>\n\n\n\n To enable MFA for a Windows system<\/strong>:<\/p>\n\n\n\n <\/p><\/div> You can enable MFA for multiple devices from the Devices tab by clicking Actions<\/strong> and choosing Enable MFA<\/strong>.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n After you save, TOTP MFA is enabled on the device and users that have been required TOTP MFA and are connected to the system will see a modified login screen that prompts them for a TOTP token.<\/p>\n\n\n\n You may need to disable Windows Automatic Restart Sign-on (ARSO) to force the TOTP authentication prompt in the Windows login screen after a machine reboot. This can be done one of two ways – via a policy or via a PowerShell command.<\/p>\n\n\n\n To disable Windows ARSO<\/strong> with a policy<\/strong>:<\/p>\n\n\n\n Create a policy with the following values to disable Windows ARSO:<\/p>\n\n\n\n <\/p><\/div> This registry key (and interface change) will not appear until the device has run through a group policy update cycle. The default group policy update cycle time is every 90 minutes with a randomized offset of up to 30 minutes.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n To disable Windows ARSO with a command:<\/strong><\/p>\n\n\n\n Run the following PowerShell command using the JumpCloud Commands module to disable Windows ARSO:<\/p>\n\n\n\n #Get Execution Policy currently To reverse the PowerShell command and remove the local group policy, run the following PowerShell command on the device in JumpCloud Commands: <\/p>\n\n\n\n # Import JC PoSh module To determine the TOTP MFA status of users connected to this device<\/strong>:<\/p>\n\n\n\n JumpCloud gives organizations the power to layer Multi-Factor Authentication (MFA) on top of nearly any resource you need to secure: […]<\/p>\n","protected":false},"author":206,"featured_media":0,"template":"","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"support_category":[2852,2908,2854],"support_tag":[],"coauthors":[2842],"acf":[],"yoast_head":"\n\n
\n
\n
Enabling TOTP MFA at the Org Level<\/h2>\n\n\n\n
\n
Enabling TOTP MFA for Your Devices<\/h2>\n\n\n\n
\n
\n
Enable TOTP MFA for Linux<\/h3>\n\n\n\n
\n
\n
Enable MFA for Mac<\/h3>\n\n\n\n
\n
\n
Enable MFA for Windows<\/h3>\n\n\n\n
\n
\n
Disabling Windows ARSO<\/h4>\n\n\n\n
\n
$exec_pol = Get-ExecutionPolicy
#Set Execution Policy to run script
Set-ExecutionPolicy Unrestricted
# Import JC PoSh module
Import-Module “C:\\Program Files\\JumpCloud\\policies\\JumpcloudPolicies\\JumpcloudPolicies”
$automaticRestartSignOn = @{
policypath = ‘C:\\Windows\\system32\\GroupPolicy\\Machine\\Registry.pol’;
policykey = ‘Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System’;
policyValuename = ‘DisableAutomaticRestartSignOn’;
policyType = ‘DWord’;
policyData = ‘1’
}
install-jcpolicy @automaticRestartSignOn
gpupdate \/force
Set-ExecutionPolicy $exec_pol<\/p>\n<\/div><\/div>\n\n\n\n
Import-Module “C:\\Program Files\\JumpCloud\\policies\\JumpcloudPolicies\\JumpcloudPolicies”$automaticRestartSignOn = @{
policypath = ‘C:\\Windows\\system32\\GroupPolicy\\Machine\\Registry.pol’;
policykey = ‘Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System’;
policyValuename = ‘DisableAutomaticRestartSignOn’;
}
uninstall-jcpolicy @automaticRestartSignOn
gpupdate \/force<\/p>\n<\/div><\/div>\n\n\n\nViewing Users’ MFA Status on the Device<\/h2>\n\n\n\n
\n