Establish authentication compliance
This topic describes the tools available to help establish whether your users are in compliance with your organization's multi-factor authentication (MFA) and user self-service policies.
Run built-in compliance reports
You can use these reports to help your organization conform to internal policies or guidelines established by NIST to ensure you are following MFA best practices. You can use these reports to help move your organization toward passwordless authentication by focusing on passwordless factors such as FIDO2 and mobile authenticators.
The following table describes the reports available in the Identity Administration portal.
For optimal performance viewing reports in the Identity Administration portal, reports should not include Roles with more than 5,000 users. You can still use the Export and Email functionality to run reports on Roles with more than 5,000 users.
Report | Description |
Path |
---|---|---|
Configured MFA For Applications |
Lists all the configured applications with the respective Authentication Profiles and MFA configurations. |
Reports > Built-in Reports > Applications |
Required Authentication Factors by User |
This report shows whether specific authentication factors are configured for users in a selected Role. When you run the report, select the factors that you want to report on in the Required Parameters window, then click OK. If you want to change the selected parameters after you run the report, click Current Parameters.
|
Reports > Built-in Reports > Compliance |
Self-Service Password Reset for AD Users |
Lists whether Self-Service Password Reset is enabled for AD users in a selected Role. To enable self-service password reset (SSPR), refer to Configure self-service password reset (SSPR). The policy set must apply to AD users. |
Reports > Built-in Reports > Compliance |
Self-Service Password Reset for all Users |
Lists whether Self-Service Password Reset is enabled for all users in a selected Role. To enable self-service password reset (SSPR), refer to Configure self-service password reset (SSPR). The policy set must apply to all users. |
Reports > Built-in Reports > Compliance |
Users in administrative Roles |
Lists configured authentication factors selected in Authentication Profiles that are applicable to users in the System Administrator Role. In the report, the Identity Profile column refers to the Authentication Profile used to secure access to Identity Administration. Radius Profile refers to the Authentication Profile used to secure access to RADIUS client connections.
|
Reports > Built-in Reports > Compliance |
Users in all Roles |
Lists configured authentication factors selected in Authentication Profiles that are applicable to all users in a selected Role. Identity Profile refers to the Authentication Profile used to secure access to Identity Administration. Radius Profile refers to the Authentication Profile used to secure access to RADIUS client connections. |
Reports > Built-in Reports > Compliance |
Design report queries based on Authenticator Assurance Level (AAL)
The Event AuthenticationAssuranceLevel is available in the report builder to show AAL compliance each time a user signs in to Identity Administration. Available AAL for signed in users increases visibility into your organizations compliance with best practices recommended in NIST SP 800-63b guidelines. This increases awareness around authentication best practices revolving around the following criteria:
-
something you are
-
something you know
-
something you have
AAL event values
AAL scoring is based on the type and combination of authentication mechanisms used. The following table provides examples of different types of authentication mechanisms available in Identity Administration.
Authentication mechanisms type | Example(s) |
---|---|
Memorized secret (MS) |
|
Out-of-band device (OOBD) |
|
Single-factor cryptographic device (SFCD) |
FIDO2 (for example, Yubikey) |
Multi-factor cryptographic device (MFCD) |
FIDO2 on device (for example, TouchID, Windows Hello) |
Single-factor One-Time Passcode device (SFOTPD) |
OATH OTP client |
Possible values for the AuthenticationAssuranceLevel (AAL) event are AAL1, AAL2, and AAL3. The following table details the combinations of mechanism types used to determine AAL scores.
AAL score | Authentication mechanism type |
---|---|
AAL1 |
|
AAL2 |
|
AAL3 |
|
Refer to Create authentication profiles for more information.
Example AAL report
The following report query returns AAL scores for user sign ins after a specified date.
|
The AuthenticationAssuranceLevel event is automatically included in searches for Core.Cloud.MfaSummary.