- Service Overview
- Billing
- Getting Started
-
User Guide
- Before You Start
- Buying an Instance
- Instance Management
-
Enterprise Administrator Guide
- Logging In to the OneAccess Administrator Portal
- User Management
-
Resources
- Overview
-
Applications
- Adding an Application
- Enabling, Disabling, or Deleting an Application
- General Information
- Authentication Integration
- Synchronization Integration
- Login Configuration
- Access Control
- Object Models
- Authorization Management
- API Permission Management
- Application Permission Management
- Security Settings
- Audit Logs
- APIs
- Authentication
- Security
- Audit
- Settings
- Common User Guide
- Key Operations Recorded by CTS
-
Best Practices
- OneAccess Best Practices
- Identity Source Integration
-
Application Integration
-
Logging In to the Huawei Cloud Through User Portal
- Introduction
- Logging In to Single Huawei Cloud Account via OneAccess Without Password (SAML - Virtual User SSO)
- Logging In to Multiple Huawei Cloud Accounts via OneAccess Without Password (SAML - Virtual User SSO)
- Logging In to Single Huawei Cloud Account via OneAccess Without Password (SAML - IAM User SSO)
- Logging In to Multiple Huawei Cloud Accounts via OneAccess Without Password (SAML - IAM User SSO)
- Logging In to Huawei Cloud via OneAccess Without Password (OIDC)
- SSO Access to Applications Through SAML
- SSO Access to Applications Through OAuth 2.0
- SSO Access to Applications Through OIDC
- SSO Access to Applications Through CAS
- SSO Access to Applications Through Plug-in Autocompletion
-
Logging In to the Huawei Cloud Through User Portal
- Data Synchronization
- Authentication Provider Integration
- Authorizing IAM Users to Access a OneAccess Instance Administrator Portal
- API Usage
- Configuring MFA for User Login
- Developer Guide
-
API Reference
- Before You Start
- API Overview
-
OneAccess APIs
-
Management APIs
- Calling APIs
- Access Credentials
-
User Management
- Creating a User
- Modifying a User
- Deleting a User
- Enabling a User
- Disabling a User
- Changing a User Password
- Verifying and Modifying the Original User Password
- Querying User Details by User ID
- Querying User Details by Username
- Querying the User List
- Authorizing an Application Account
- Querying All Authorized Application Accounts of a User
- Organization Management
- Application Organization Management
- Application Account Management
- Application Role Management
- User APIs
- Application Integration APIs
-
Management APIs
- Appendix
- FAQs
- General Reference
Copied.
Managing Authentication Strategies
OneAccess simplifies user access management by offering a unified solution. With authentication strategies, you can control access for specific users based on factors like access time, device type, and region range. Furthermore, you can allow access, deny access, or enable multi-factor authentication (MFA) for specified users.
Adding an Authentication Strategy
- Log in to the administrator portal.
- On the top navigation bar, choose Authentication > Authentication Strategy.
- On the displayed page, click Add a strategy.
- Configure the strategy.
Table 1 Strategy parameters Parameter
Description
*Policy Name
Name the added authentication strategy for easy management.
Description
Add a description for the authentication strategy.
User Condition
Select the user range. The options include All users, Qualified users, and Disqualified users.
Access Time
Time range when users are allowed or not allowed to access the application. The options include Any time, Within specific periods, and Outside specific periods.
Device Type
Type of devices that are allowed or not allowed to access the application. The options include Browser, Desktop device, and Mobile device.
Regions
Set the region range. The options include Any, Chinese Mainland, Outside the Chinese Mainland, Within specific regions, Outside specific regions.
Authentication Provider
Select authentication provider that users can or cannot use to access the application. The options include Any, With specific authentication providers, and Without specific authentication providers.
Risk operation
Select the user who triggers a risk event. You can select multiple users, which is the same as the risk event in risk behavior management.
Access control
Specify how to manage user access. You can choose to allow access, deny access, or enable multi-factor authentication (MFA) for users who meet specific criteria.
NOTE:
If MFA authentication is selected, five authentication modes are available: OTP, SMS, email, FIDO2, and fingerprint authentication.
- Click Save.
Modifying an Authentication Strategy
- Log in to the administrator portal.
- On the top navigation bar, choose Authentication > Authentication Strategy.
- On the authentication strategy page, click Modify in the Operation column of the target strategy. On the displayed page, modify the authentication strategy configuration.
- Click Save.
Deleting an Authentication Strategy
You can delete authentication strategies as needed.
- Log in to the administrator portal.
- On the top navigation bar, choose Authentication > Authentication Strategy.
- Click Delete in the Operation column of the target strategy.
- Click OK.
Disabling an Authentication Strategy
If you do not want to use the authentication strategy in a certain period, you can disable it by changing its status.
- Log in to the administrator portal.
- On the top navigation bar, choose Authentication > Authentication Strategy.
- In the Status column of the target strategy, click
.
- In the displayed dialog box, click OK to disable the strategy.
Enabling an Authentication Strategy
If an authentication strategy has been disabled, you can enable it when you need to use it.
- Log in to the administrator portal.
- On the top navigation bar, choose Authentication > Authentication Strategy.
- In the Status column of the target strategy, click
.
- In the displayed dialog box, click OK to enable the strategy.
Adjusting the Strategy Priority
A maximum of 10 authentication strategies can be added. You can drag a strategy in the authentication strategy list to change its priority.
- Log in to the administrator portal.
- On the top navigation bar, choose Authentication > Authentication Strategy.
- Drag the target strategy upwards or downwards to a desired sequence.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot