The Cirrus One-Time Code product is designed for customers who need a lightweight option for step-up MFA. An example use case is a proxy customer who is using the Cirrus Proxy for applicant logins to Slate, financial aid, and housing applications prior to full admission. This product relies on an email assertion from your identity provider(s) to know where to send a validation code. Scenarios where the IdP-asserted email may not be accurate (e.g., old alumni records that may be long out of date) are not a good candidate. The Cirrus Bridge does not currently support this product.
Requirements:
This product is an add-on to augment identity provider behavior. You can require MFA for any SAML identity provider(s) implemented for the Proxy. When signing in from a MFA-enabled IdP, Cirrus emails a code to the email asserted by that IdP and has the user verify it.
First you will need to collect the following information:
To implement a custom from address for your institution, you will need to configure an email handler. Follow the instructions at Configure the Email Handler.
One-Time Code MFA is live once our team configures it. To schedule the go live, send the configuration information to your Technical Implementation Lead and they will coordinate a go live time with you.
You will need to test with an email account that is part of your domain and an external email address. Additionally, you will want to test on campus and off-campus to ensure your email server settings are correct.
Step 1 - Login to an Application Through a MFA-Enabled IdP
First you will navigate to one of your applications through an IdP that is configured to use One-Time Code MFA. You will reach a screen to enter the MFA code.
Step 2 - Retrieve the Code from Email
Check your email and retrieve the MFA code from your email.
Step 3 - Enter the MFA code
Return to the screen from Step 1 and enter the code to complete sign-in.
Step 4 - Continue on the Application
Verify that your login to the application was successful.
Logs for One-Time Code MFA are available via the LogAPI with a logType of emailMFA. Details can be found at One-Time Code MFA Log Elements.