MFA Through Identity Providers
NetBird leverages your configured identity provider’s MFA capabilities rather than implementing its own MFA system. This approach provides:- Centralized Security: Manage MFA policies in one place
- Consistent Experience: Users use familiar MFA methods from your IdP
- Advanced Features: Access IdP-specific features like adaptive authentication
- Reduced Complexity: No separate MFA system to maintain
Supported MFA Methods by IdP
Different identity providers support various MFA methods:- Auth0
- Azure AD
- Okta
- Google Workspace
- Keycloak
Auth0 supports multiple MFA methods:
- SMS one-time passwords (OTP)
- Push notifications via Auth0 Guardian
- Time-based OTP (TOTP) apps like Google Authenticator
- Email OTP
- WebAuthn/FIDO2 security keys
- Biometric authentication
Enforcing MFA for NetBird Access
To require MFA for NetBird authentication:Set MFA Policy
Create an authentication policy that requires MFA for NetBird application access.Example for Auth0:
IdP-Specific Configuration
Auth0 MFA Enforcement
Azure AD Conditional Access
Create a Conditional Access policy:- Navigate to Azure AD > Security > Conditional Access
- Create new policy:
- Name: NetBird MFA Required
- Users: Select target users/groups
- Cloud apps: Select NetBird application
- Grant: Require multi-factor authentication
- Enable the policy
Okta Sign-On Policy
- Go to Security > Authentication Policies
- Add Rule to your NetBird app:
- Rule Name: Require MFA
- Prompt for factor: Every sign on
- Re-authentication frequency: Every time
User Enrollment
Guide users through MFA enrollment:Backup Authentication Methods
Always configure backup authentication methods to prevent lockouts:Backup Codes
Generate one-time backup codes users can print and store securely.
Multiple Devices
Allow users to register multiple MFA devices.
Alternative Methods
Enable SMS or email as fallback when primary method unavailable.
Admin Recovery
Establish admin procedures for MFA reset requests.
Periodic Re-Authentication
NetBird supports periodic re-authentication to ensure users remain authorized:Login Expiration
Peers added via SSO can be configured to require periodic re-authentication:- Minimum: 1 hour (3600 seconds)
- Maximum: 180 days (15552000 seconds)
- Only applies to peers added via SSO login (not setup keys)
Inactivity Expiration
Automatically expire inactive peer sessions:Monitoring and Compliance
Authentication Logs
Monitor MFA usage through your IdP’s logging:- Track successful MFA authentications
- Identify failed MFA attempts
- Review MFA enrollment rates
- Detect anomalous authentication patterns
Compliance Reporting
Generate reports to demonstrate MFA compliance:Auth0 Compliance Reports
Auth0 Compliance Reports
Use Auth0 logs to export authentication events:
Azure AD Sign-In Reports
Azure AD Sign-In Reports
Access Azure AD sign-in logs:
- Navigate to Azure AD > Monitoring > Sign-ins
- Filter by NetBird application
- Export to CSV or connect to Azure Sentinel for advanced analytics
Okta System Logs
Okta System Logs
Query Okta system logs:
Troubleshooting
Users Not Prompted for MFA
Users Not Prompted for MFA
Possible causes:
- MFA policy not applied to NetBird application
- User already has active session with valid MFA
- Policy exceptions or exclusions in effect
- Verify policy assignment in IdP
- Force user logout and re-login
- Review policy conditions and exclusions
MFA Enrollment Failures
MFA Enrollment Failures
Possible causes:
- Time synchronization issues with TOTP
- Network connectivity problems
- Incompatible authenticator app
- Ensure device time is synchronized (NTP)
- Check network firewall rules
- Try alternative MFA method
- Use IdP’s recommended authenticator app
User Locked Out
User Locked Out
Recovery steps:
- Verify user identity through established procedures
- Use admin console to reset MFA for the user
- Have user re-enroll MFA devices
- Provide backup codes for future use
Best Practices
Phased Rollout
Deploy MFA in phases:
- Start with IT/admin users
- Expand to privileged users
- Roll out to all users
User Education
Provide comprehensive training:
- Explain why MFA is important
- Demonstrate enrollment process
- Share troubleshooting resources
Regular Audits
Periodically review:
- MFA enrollment rates
- Authentication success rates
- Backup method usage
- Policy effectiveness
Next Steps
Posture Checks
Add device security requirements
Access Control
Configure network access policies