🤔 What is multi-factor authentication?
Multi-factor authentication is more than just a user screening process, it’s an enhanced measure of protection for your business. In addition to your standard connection identifiers, MFA requires the use of one or more additional validation elements (authentication applications, security key, etc.). Multi-factor authentication is a fundamental means of securing credentials, and preventing phishing attacks and account hacks.
🙄 Why is multi-factor authentication essential?
The use of user names and passwords is necessary for all connections to your interface, but this combination remains susceptible to external computer attacks. To prevent these cyberattacks, which have increased since the beginning of 2020 with the massive adoption of the cloud and implementation of teleworking, Salesforce has looked to MFA to allow you to add additional layers of security to your connection procedure. MFA is a simple and effective method, adaptable to your unique and dynamic business needs.
😊 How does Salesforce MFA work?
In addition to the basic connection information for each user, MFA introduces a second form of authentication prior to allowing account access. Salesforce allows for four different MFA verification methods.
- Salesforce Authenticator Application
Free from Salesforce, this is a mobile application that you can connect directly to your account that sends push notifications to your mobile phone whenever someone attempts to log in to your account
- 3rd Party Authentication Applications
A wide variety of applications which allow you to generate unique temporary codes to verify your identity will also be available for OS and Android systems
- Security Keys
You can also authorise the use of easy-to-use physical security keys. This solution is beneficial as it does not require specific connectivity
- Built-in Authenticators
Finally, by linking them to your Salesforce account, the recognition of fingerprint, iris, face, PIN code or password can also be integrated via your personal devices.
🧐 How to deploy MFA within your organisation?
In order to ensure a successful MFA deployment strategy, you will need to define your platform business needs, and the methods that will work best for deployment in your organisation.
- Preparation: Evaluate the most suitable authentication methods for your teams, and evaluate the types of confidential data in your organisation and the roles of your users. Develop a rollout plan to effectively implement your deployment and create a post-deployment support strategy for your teams.
- Deployment: Once your deployment strategy is planned, you can begin rolling out MFA to your teams. A gradual deployment is recommended, prioritised by the attributes and privileges of users most likely to be the target of an outside threat, such as your administrators. Phase two deployment can focus on our other users, depending on the business importance of each role until you have achieved implementation of MFA within your entire organisation.
- Management: Once MFA is deployed, track its usage and adoption by your users. Do not hesitate to employ internal training with teams in order to ensure proper adoption, adhere to policy and protection of your sensitive data.