Authentication

Authentication » Google Authenticator for AD Password Reset

Configuring Google Authenticator for Active Directory password resets and logins

Google Authenticator is an authentication method developed by Google that uses a time-based one-time-passcode (TOTP) in order to verify users' identities. It is often used as one of the multi-factor authentication (MFA) methods along with others in order to secure the login process into a service. Authentication using this method requires the Google Authenticator app. After the users have provided valid login credentials, the service asks them for the 6-digit TOTP from the app. The users then have to run the app to obtain the TOTP and enter it in the service, and verify their identity.

Empowering Active Directory domain users with self-service password reset can benefit an organization in more ways than one.

  • Users need not wait for admin intervention and can have seamless access to their machines.
  • The help-desk admin will not be tasked with hundreds of password reset requests and can instead attend to other crucial tasks.

However, providing users with the ability to reset their passwords can be risky if proper security measures are not put in place. Since users won't have to provide any old credentials, it is important to verify their identities before they can reset their passwords. Using a multi-factor authentication (MFA) method like Google Authenticator is a fail-safe way to authenticate them for Active Directory domain password resets.

ADSelfService Plus, an identity security solution, offers a self-service password reset and account unlock feature that is secured by MFA. The solution supports up to 19 methods of MFA including Google Authenticator, biometrics, and YubiKey Authenticator to verify users' identities during:

  1. Windows, macOS, and VPN logins.
  2. Outlook Web Access logins
  3. Active Directory self-service password reset or account unlock actions via the ADSelfService portal, ADSelfService Plus mobile app, and native Windows/macOS/Linux login screen.
  4. Enterprise application logins through single sign-on (SSO).
  5. Self-update of Active Directory profile information, subscription to mail groups, and employee search using ADSelfService Plus.

Step to enable Google Authentication for MFA in ADSelfService Plus:

  1. Download and install ADSelfService Plus.
  2. Configure your Active Directory domains.
  3. Navigate to Configuration → Self-Service → Multi-factor Authentication → Authenticators Setup.
  4. From the Choose the Policy drop-down, select a policy.

    Note: ADSelfService Plus allows you to create OU and group-based policies. To create a policy, go to Configuration → Self-Service → Policy Configuration → Add New Policy. Click Select OUs/Groups, and make the selection based on your requirements. You need to select at least one self-service feature. Finally, click Save Policy. Only users belonging to OUs and groups in the policy can make use of the self-service feature(s) selected.

  5. Click Google Authenticator section.
  6. Click the Enable Google Authenticator button.

Enabling Google Authenticator for Active Directory password resets

  1. Go to Configuration → Self-Service → Multi-factor Authentication → MFA for Reset/Unlock.
  2. Enter the number of authentication factors to be enforced, and select Google Authenticator along with any other authentication techniques to be used.
  3. Click Save Settings.

Enabling Google Authenticator for Active Directory domain logins

  1. Go to Configuration → Self-Service → Multi-factor Authentication → MFA for Endpoints.
  2. Select a policy from the Choose the Policy drop-down. This will determine which authentication methods are enabled for which sets of users.

    Note: ADSelfService Plus allows you to create OU and group-based policies. To create a policy, go to Configuration → Self-Service → Policy Configuration → Add New Policy. Click Select OUs/Groups, and make the selection based on your requirements. You need to select at least one self-service feature. Finally, click Save Policy.

  3. In the MFA for Machine Login section, check the Enable _ authentication factors box and select the Google Authenticator from the drop-down.
  4. Click Save Settings.

Note:

To enable MFA for Active Directory domain logins:

  • The ADSelfService Plus login agent must be installed on client machines. Click here for steps on login agent installation.
  • SSL must be enabled: Log in to the ADSelfService Plus web console with admin credentials. Navigate to the Admin tab → Product Settings → Connection. Select the ADSelfService Plus Port [https] option.

Learn more about ADSelfService Plus and its Multi-factor Authentication feature.

Why choose ADSelfService Plus' self-service password resets secured by Google Authenticator?

  • Customizable configurations: Choose the specific Active Directory OUs, groups, and domains to be allowed self-service password resets secured by Google Authenticator or other MFA methods.
  • Conditional access: Automatically enable or revoke access to self-service password resets based on risk factors like time of access, geolocation, IP address, and device used.
  • Audit and track user actions: Password resets and other actions performed by the user are regularly audited and compiled into comprehensive reports.

Simplify password management with ADSelfService Plus.

Self-service password management and single sign-on solution

ManageEngine ADSelfService Plus is an integrated self-service password management and single sign-on solution for Active Directory and cloud apps. Ensure endpoint security with stringent authentication controls including biometrics and advanced password policy controls.