How to configure IP-based MFA bypass for trusted locations in ADSelfService Plus | ManageEngine ADSelfService Plus

How to create IP-based rules to bypass MFA for specific client locations in ADSelfService Plus


  In this article     

  • Objective

  • Prerequisites   

  • Steps to follow

  • Validation and confirmation

  • How to reach support

 

 Objective 

To configure a rule that allows users from a specified area (based on IP) to bypass multi-factor authentication (MFA), follow these guidelines for setting up Adaptive MFA using Conditional Access.

Note: The policy names used in this article are for illustrative purposes only.

   

 Prerequisites 

  • Professional edition of ADSelfService Plus

  • Endpoint MFA add-on license

  • ADSelfService Plus application must be hosted on the internet with X-Forwarded-For enabled

 Note on X-Forwarded-For 

Perimeter security is essential for this setup. When users connect from a public IP address, the request initially reaches the perimeter firewall before proceeding to the ADSelfService Plus server. This means the server sees the firewall’s IP address, not the user’s original IP. If the firewall’s IP falls within the internal range, MFA won’t be enforced. To address this, ensure that X-Forwarded-For is enabled at each network hop. This ensures the source IP is included in the request, allowing accurate IP-based Conditional Access.

 Steps to enable X-Forwarded-For 

  • To enable X-Forwarded-For in ADSelfService Plus, navigate to the conf folder in the installation directory and open the security.xml file.

  • Update the following <Valve> configuration:

<Valve className="org.apache.catalina.valves.RemoteIpValve" remoteIpHeader="x-forwarded-for" proxiesHeader="x-forwarded-by" requestAttributesEnabled="true" internalProxies="172\.16\.10\.20"/>, replacing 172\.16\.10\.20 with your proxy server’s IP.

  • Save the file, then restart the ADSelfService Plus service to apply the changes.

 

 Steps to follow 

 Step 1: Creating policies   

  1. Create a policy named "Internal Policy", targeting relevant users and configuring MFA for required endpoints; refer to these policy configuration steps for detailed instructions.

  2. Duplicate the Internal Policy by clicking the Copy option under the Actions column and renaming it to "External Policy".

  3. Edit the Internal Policy and disable MFA for endpoints.

  • Navigate to Configuration > Multi-Factor Authentication, and select the policy named Internal Policy. Select the MFA for Endpoints tab, then in the MFA for Machine Login section, disable the Enable N factor authentication for Machine login checkbox.

 


 

 Step 2: Configuring Conditional Access   

  1. Go to Configuration > Self Service > Conditional Access.

  2. Create a rule named Internal Access. This rule will define the internal IP range, ensuring that users within this range are assigned the newly created Internal Policy, where MFA is disabled.

 

  


 

 

3. Copy the Internal Access rule and rename it as External Access. Modify this rule’s criteria to "NOT 1," meaning all IP addresses outside the defined internal range.

4. Navigate to the Rule Assignment tab, then select External for the Choose CA rule drop-down. In the Access Controls section, enable the Assign Policies checkbox and assign the External Policy.

 


 

 Validation and confirmation   

  • If a user’s machine connects from a public network (i.e., the IP is not in the internal range), the External rule applies, activating the External Policy where MFA is required.

  • If a user’s machine is on the office LAN (i.e., the IP is in the internal range), the Internal rule applies, activating the Internal Policy where MFA is disabled, allowing the user to log in without MFA.

How to reach support           

For further assistance, contact our support team here.   

                  New to ADSelfService Plus?

                    • Related Articles

                    • How to create IP-based rules to bypass MFA for specific client locations in ADSelfService Plus

                      Objective This article explains how to configure a rule that allows users from a specified area (based on IP) to bypass multi-factor authentication (MFA) for setting up Adaptive MFA using Conditional Access. Note: The policy names used in this ...
                    • How to enable offline MFA in ADSelfService Plus

                      ManageEngine ADSelfService Plus supports offline multi-factor authentication (MFA) for Windows machine logins, User Account Control (UAC) prompt elevation, and Remote Desktop Protocol (RDP) server authentication when the product server is ...
                    • Multi-factor authentication techniques in ADSelfService Plus

                      Let's take a look into the various authentication methods supported by ADSelfService Plus for enterprise multi-factor authentication (MFA). Why should you use MFA? Authentication based solely on usernames and passwords is no longer considered secure. ...
                    • Bind ADSelfService Plus to run on a specific virtual IP address

                      Description You can configure ADSelfService Plus to run on specific IP address. Resolution Step 1: Create a virtual IP Address on the machine where ADSelfService Plus is running. Start → Settings → Control Panel → Open Network connection. Right click ...
                    • Configuring MFA for FTD VPN using RADIUS

                      This guide provides steps for enabling multi-factor authentication (MFA) using RADIUS for Cisco's Firepower Threat Defense (FTD) product using ManageEngine ADSelfService Plus' MFA for VPN feature. To enable RADIUS-based authentication for Cisco FTD, ...