VMware Aria Automation Tools

 View Only
  • 1.  MFA in onprem vRealize Automation 8.x

    Posted Feb 24, 2022 08:16 AM

    Is it possible to enable multifactor authentication i vRealize Automation 8.x, it was passible in version 7, but i don't see it version 8. 

    If not, do anybody know if it's on the roadmap. This is feature that multiple of my customer would like to see, with something like Azure MFA.



  • 2.  RE: MFA in onprem vRealize Automation 8.x

    Posted Feb 24, 2022 04:12 PM

    As vRA8 uses idM / workspace one, they support MFA. I have not used it but according to a quick search looks supported.

    HTH



  • 3.  RE: MFA in onprem vRealize Automation 8.x

    Posted Feb 25, 2022 03:26 PM

    For what it's worth, we do our MFA using Okta. It works as advertised.

    https://help.okta.com/en/prod/Content/Topics/device-trust/SAML/Mobile/configure-okta-idp-vidm.htm



  • 4.  RE: MFA in onprem vRealize Automation 8.x

    Posted Mar 29, 2022 07:44 PM

    Thanks, that did help, I got it to work with Azure AD, I might do a blog about the configuration next week.



  • 5.  RE: MFA in onprem vRealize Automation 8.x

    Posted Apr 04, 2022 01:21 PM

    Just did a blog about how to configure this.

    https://www.virtual-allan.com/vra-8-x-and-azure-ad-mfa/



  • 6.  RE: MFA in onprem vRealize Automation 8.x

    Posted Mar 13, 2023 03:13 PM

    Hi, I just read through your blog and am about to test in my own initial environment.  I have a green field I've blown away and redeployed a few times. 

    I'm a little hesitant to disable users at local domain.  But I think there may be a way to isolate and allow based on the IP range.  So I am going to test that and will report back my findings. 

    But I'd love to hear from anyone else who has any additional input on using this method or others for MFA. 

    Thanks again for the blog.

     



  • 7.  RE: MFA in onprem vRealize Automation 8.x

    Posted Mar 13, 2023 08:49 PM

    So I created a separate policy, and that didn't seem to work. 

    But following the directions in the blog; and then adding to the default policy, a special management network, that uses the original Password / fallback Password (Local Directory).  It works. 

    From the special management network, it uses normal auth method and you can login as the admin account you created at install; or you can change domain to use local AD.

    From anywhere else, when you click login, it goes out to Azure AD requiring MFA.

    vRA8-vIDM-AzureAuth.png