Pricing  Get Quote
 
 

How to configure conditional access MFA in ADSelfService Plus?

In this article:

Objective

This article explains how to configure Conditional Access MFA in ADSelfService Plus to implement adaptive MFA using conditional access policies for secure, context-aware authentication. It enables organizations to enforce or bypass MFA dynamically based on contextual factors such as IP address, device type, location, and time of access. This conditional MFA approach strengthens security while minimizing user friction.

Steps to configure MFA conditional access

Implementing MFA conditional access involves configuring conditional access rules and policies. A conditional access rule is configured using three building blocks:

  • Conditions: These are the basics based on which the access will be controlled. ADSelfService Plus provides you an option to control access based on IP address, device, time of access, and geolocation conditions.
  • Criteria: The conditions configured can be used to formulate criteria using Boolean operators such as AND, OR, and NOT.
  • Associated self-service policy: Self-service policies in ADSelfService Plus govern which features users can utilize. These policies allow you to configure how features should work for different sets of users based on their OU and group membership. By associating the conditions and criteria with one or more self-service policies, you configure a conditional access rule.

Step 1. Configuring a self-service policy

  1. Navigate to the Configuration tab.
  2. Click the Add New Policy button on the bottom-right side of the page.
  3. Enter an appropriate Policy Name.
  4. From the list of self-service features provided, select features for your user base. You need to select at least one self-service feature.
  5. Click the Select OU(s)/Groups button.
  6. Select the domain that the policy will be applied to. Here you have a choice; you can either apply the policy to all users in the selected domain or only to specific users based on their OU or group membership.
  7. Click OK.
  8. Click Save Policy.

    Steps to configure a self-service policy in ADSelfService Plus.

    Fig 1: Instructions for creating a self-service policy in ADSelfService Plus.

Note: You can also associate self-service policies with other capabilities, like MFA, SSO, and password synchronization, to ensure users under the policy have access to those features.

Step 2. Configuring conditions

  1. Navigate to Configuration > Self-Service > Conditional Access > Rule configuration.
  2. Click Configure New Conditional Access (CA) Rule.

    Steps to configure conditional access MFA rules in ADSelfService Plus.

    Fig 2: Instructions to configure conditional access MFA rules in ADSelfService Plus.

  3. Enter a CA Rule Name and Description.
  4. Configure any of the four conditions with these steps:
    • IP Address
      • Select the check boxes next to the necessary IP address types:
        • Static IPs: For users who connect to your network directly through their client computers
        • Proxy Server IPs: For users who connect through a proxy server
        • VPN IP address: For users who connect through a VPN server
        Note: If you have enabled all three types of IPs, the following rule applies: (Static IPs AND Proxy IPs) OR VPN IPs.
      • Select whether to trust or not trust the entered IPs. Trusted IPs will be allowed access, and untrusted IPs will be blocked.
      • For Static IPs, enter the range of IP addresses in the IP Range fields. Use the + icon to add more IP ranges. You can also enter individual IPs and use * as the wildcard character for selecting a whole class of IP.
    • Device
      • Select the Computers check box and then click the + icon.
      • In the Select Computer dialog box that opens, select the domain and then the computer objects. Click Save.
      • Select the Platforms check box and then use the drop-down to select the platform(s). You can choose from Windows, macOS, Linux, the ADSelfService Plus mobile web app, the ADSelfService Plus native mobile app, and ManageEngine applications.
    • Business Hours
      • Select the Business Hours check box.
      • Select Business hours or Non-business hours according to your requirements.
      • From the Day and Time range provided, configure your business or non-business hours.
      Note: The time will be applied based on the time zone of the solution configured in Admin → Personalize → Time Zone settings.
    • Geolocation
      • Select the Geolocation check box.
      • Select the Countries from the drop-down.
      Note: Geolocation-based conditional access relies on the user's IP address to determine the location. Only public IP addresses will be evaluated for geolocation. Access attempts from private IP addresses will be excluded from this condition.

      Steps to configure the conditions for conditional access rule in ADSelfService Plus.

      Fig 3: Instructions to configure the conditions for conditional access rule in ADSelfService Plus.

Step 3. Creating criteria

After configuring the conditions, Criteria can be formulated using operators like AND, OR, and NOT. This criteria will decide how the different conditions will be evaluated to determine the access request's result. Each condition is assigned a number: IP Address is 1, Device is 2, Business hours is 3, and Geolocation is 4. You can use these numbers and operators to create the criteria.

For example, 1 AND (2 OR 3) and 1 AND (3 OR (NOT 4))

Step 4. Assigning rules

  1. Go to Configuration > Self-Service > Conditional Access > Rule assignment.
  2. Select the rule that you want to assign from the drop-down.
  3. Select the policy that applies to the users you want to be evaluated.
  4. Note: If a user is part of multiple policies, and at least one has CA enabled, they will only be able to perform actions allowed under the policy where the user meets the CA rule. Example: Consider three self-service policies, A, B, and C, and two CA rules, 1 and 2. Assume a user belongs to policies A and B. Let's say both policies A and C are assigned to rule 1. If a user satisfies rule 1, then only policy A will be assigned to the user, as they have satisfied the CA rule assigned to policy A.
  5. Allow or block NTLM SSO and ADSelfService Plus portal access. These settings will be applicable wherever the selected rule is satisfied.
    Note: The option to allow or block NTLM SSO will be enabled only if NTLM authentication is configured under Admin > Customize > Login Settings > Single Sign-On.

    Steps to assign the conditional access rule in ADSelfService Plus.

    Fig 4: Instructions to assign the conditional access rule in ADSelfService Plus.

Prioritizing conditional access MFA rules

If you have created multiple conditional access MFA rules, you can set priority for each rule so that the rule with the highest priority is applied to users who fall under multiple rules.

To prioritize the rules:

  1. From the Conditional Access configuration page, click the change priority icon in the top-right corner (next to the Configure New Conditional Access (CA) Rule button).
  2. All the configured conditional access rules will be listed. Drag and rearrange them based on your requirements. The rule at the top will be given the highest priority.

Editing or deleting the conditional access MFA rules

A conditional access rule can be modified to change the conditions or criteria, copied to create a new rule, disabled, or deleted.

  1. Go to the Conditional Access configuration page. The configured conditional access rules will be displayed in a table.
  2. Under the Actions column, click on an icon based on the action you want to perform.
  3. Toggle the and icons to enable or disable a rule. If there is a ☑ icon, it means the rule is enabled, and if there is a ☒ icon, it means the rule is disabled.
  4. Click the icon to modify the rule.
  5. Click the icon to copy the rule and create a new rule from it.
  6. Click the icon to delete a rule.

Validation and confirmation

To validate your MFA conditional access policy configuration in ADSelfService Plus, log in using a test user account that matches your configured self-service policy. Access the portal from different scenarios—such as a trusted versus untrusted IP address, a managed versus unmanaged device, and during business hours versus off-hours. Verify that the conditional access for MFA is enforced or bypassed correctly based on the logic defined in your conditional access rules.

Conditional access MFA best practices

To effectively implement a conditional access MFA in ADSelfService Plus, follow these best practices to strike the right balance between security and usability:

  1. Define trusted zones

    Configure trusted IP addresses and known devices under the conditional access settings. This ensures that users connecting from secure, internal networks or company-managed devices are not unnecessarily challenged with MFA prompts.

  2. Enforce MFA outside of business hours

    Increase access control during high-risk times like nights or weekends, when unauthorized activity is more likely.

  3. Apply regional restrictions

    Limit access to only those countries where your workforce operates. This helps mitigate risks from unknown or suspicious regions.

  4. Use layered conditions for precision

    Combine multiple conditions (IP, device type, time of access, geolocation) to create adaptive MFA rules. This ensures stronger authentication is applied only when risks are elevated.

  5. Support secure MFA exceptions

    Certain users or scenarios may require bypassing Conditional Access MFA. ADSelfService Plus enables this by allowing administrators to create context-aware rules—ensuring secure exceptions without weakening overall security. Examples:

    • New employee provisioning
    • Emergency (break-glass) accounts
    • Logins from secure internal networks

Related topics and articles

Conditional access policy

Adaptive MFA

Bypass conditional access MFA

Request for Support

Need further assistance? Fill this form, and we'll contact you rightaway.

  • Name
  •  
  • Business Email *
  •  
  • Phone *
  •  
  • Problem Description *
  •  
  • Country
  •  
  • By clicking 'Submit' you agree to processing of personal data according to the Privacy Policy.
Highlights of ADSelfService Plus

Password self-service

Allow Active Directory users to self-service their password resets and account unlock tasks, freeing them from lengthy help desk calls.

One identity with single sign-on

Get seamless one-click access to 100+ cloud applications. With enterprise single sign-on, users can access all their cloud applications using their Active Directory credentials.

Password and account expiry notification

Intimate Active Directory users of their impending password and account expiry via email and SMS notifications.

Password synchronization

Synchronize Windows Active Directory user passwords and account changes across multiple systems automatically, including Microsoft 365, Google Workspace, IBM iSeries, and more.

Password policy enforcer

Strong passwords resist various hacking threats. Enforce Active Directory users to adhere to compliant passwords by displaying password complexity requirements.

Directory self-update and corporate directory search

Enable Active Directory users to update their latest information themselves. Quick search features help admins scout for information using search keys like contact numbers.

ADSelfService Plus trusted by

Embark on a journey towards identity security and Zero Trust