可以在移动应用SSO流程上自动化ADFS SAML SSO SSO MFA验证器应用程序代码吗?
我拥有与ADF一起使用的适当身份验证的SAML服务。当我们打开MFA时 - SSO流从身份验证器应用程序请求访问代码。在移动设备上似乎有效的唯一方法是脱离SSO应用程序,然后转到Authenticator应用程序来检索新代码。然后,用户必须返回移动应用程序并手动将其冲入。是否有一个自动化步骤或配置设置,可以通过在现有SAML流中自动化AUTH步骤,而不必脱离来使该流程更加用户友好检索代码的应用程序?
I have a properly authenticating SAML service working with ADFS. When we switch on MFA - the SSO flow requests an access code from an Authenticator app. The only way this seems to work on a mobile device is to break out of the SSO app and go to the Authenticator app to retrieve a new code. Then the user has to return to the mobile app and manually punch it in. Is there an automation step or config setting somewhere that might make this flow more user friendly by automating the auth step within the existing SAML flow instead of having to break out of the app to retrieve the code ?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
•由于您已经为具有MFA的ADF配置了SAML SSO,然后选择'Microsoft Authenticator'应用程序为第二个因素身份验证介质,在此过程中,您将必须输入出现在此过程中的一次性密码在MFA身份验证窗口中的Authenticator应用程序中,应用程序30秒。因此, 这与OTP(一次密码)不同,它在请求通过ADF登录时在手机中作为短信接收。好像这是一条短信一样,可以通过在手机的“应用程序和权限”部分中读取应用程序的读取文本消息权限来自然复制。同样,
我建议您授予您的应用程序许可,以在手机设置中从Microsoft Authenticator应用中读取数据,并因此对其进行测试
。•但据我所知,您的应用程序可能没有配置设置可以这样做,因为Microsoft Authenticator App只是一个从“ PlayStore”安装的应用程序,与任何其他系统应用程序(如文本消息),Innuilt Innuilt App Notification,Notification,Inforification,Inforification,等等。这将使您可以读取Microsoft Authenticator应用程序中生成的“一次性密码”,并且实际上将通过ADFS自动化您的应用程序登录的两因素身份验证。
请参考下面的链接以获取更多信息。修改'androidappManifest.xml'文件: -
https://www.geeksforgeeks.org/how-to-the-draw-over-obter-opps-in-android/#: text = text = in%20Order%20TRADPRAFDPRAWPRAFDPRAFDPRAFDPRAFDPRAFDPRAFD%20OFRIM20OVERM20OVER,ANDROID 。
//learn.microsoft.com/en-us/windows-server/indentity/ad-fs/operations/configure-ad-fs-and-azure-mfa“ rel =“ nofollow noreferrer”> https://learlearn.microsoft .com/en-us/windows-server/identity/ad-fs/operations/configure-ad-fs-and-azure-mfa
• Since, you have configured SAML SSO for ADFS with MFA, and selected ‘Microsoft Authenticator’ app as second factor authentication medium, in this process, you will have to enter the one-time passcode appearing in the app for 30 seconds in the authenticator app in the MFA authentication window. So, since this is not unlike OTP (One Time Passcode) which is received as a text message in your cell phone upon requesting for login through ADFS. As if it was a text message, it could be naturally copied by giving the app access to read text messages permission in ‘Apps and permissions’ section of the cell phone if it was Android. Similarly,
I would suggest you to please give your app permission to read the data from Microsoft Authenticator app in your cell phone settings and accordingly test it
.• But as far as I know, your app may not have the configuration settings to do so as Microsoft Authenticator app is just an application that is installed from ‘Playstore’ unlike any other system app like text message, inbuilt app notification, etc. Thus, I would like to suggest you to please enable the setting ‘Draw over other apps’ for your app which requires authentication through ADFS for the Microsoft Authenticator app by modifying the ‘AndroidAppManifest.xml’ file which will make it possible to read the ‘One-time passcode’ generated in the Microsoft authenticator app and in effect will automate the two-factor authentication for your app login through ADFS.
Kindly refer to the link below for more information on modifying the ‘AndroidAppManifest.xml’ file: -
https://www.geeksforgeeks.org/how-to-draw-over-other-apps-in-android/#:~:text=In%20order%20to%20draw%20over,android.
Also, find the link below which states the configuration that needs to be done for enabling the Azure MFA as well as various prerequisites needed for that purpose: -
https://learn.microsoft.com/en-us/windows-server/identity/ad-fs/operations/configure-ad-fs-and-azure-mfa