Secure Identities and Access Workshop Delivery Guide 4 July 2022


Multi-factor Authentication Presentation



Download 1.16 Mb.
Page26/37
Date08.08.2023
Size1.16 Mb.
#61825
1   ...   22   23   24   25   26   27   28   29   ...   37
Secure Identities and Access
Multi-factor Authentication Presentation – 30 minutes

  • Deliver the activity by presenting the 07 - Secure Identities and Access - MFA.pptx presentation.

NOTE 1: The end of the presentation has a hidden slide that talks about use of Azure AD Multi-factor Authentication with AD FS. Use this slide only if use of AD FS was decided upon in the design discussion on identity and authentication as described in 11.2 Identity Fundamentals.
NOTE 2: if Passwordless optional module is part of the engagement, then consider delivering only the first slide of “Passwordless authentication” section or skipping it entirely.

    • When presenting, be concise and stick to the facts.

    • Allow the customer to draw their own conclusions.

    • Make sure you reserve some time for Q&A.

  • Work on the deployment plan for Multi-factor Authentication – 30 minutes

    • Using the completed 05 – Secure Identities and Access - Customer Questionnaire.docx as input and the 98 - Secure Identities and Access - Design Decision Points.xlsx to guide the discussion, help the customer make their authentication strategy more secure by deploying MFA, documenting the design decisions in the 98 - Secure Identities and Access - Design Decision Points.xlsx. Especially focus on these design decisions:

      • Way of enabling MFA.

      • Second authentication factor(s).

      • Users and cloud applications that should be protected by MFA.

NOTE 1: If Conditional Access was selected as the method to enable MFA (as is recommended), then the design decisions about users and cloud applications to be protected by MFA will serve as direct input to the next activity of the engagement described in section 11.5 Conditional Access (CA).
NOTE 2: Due to time constraints, do not expect to make all design decisions during the Secure Identities and Access Workshop. Aim to make design decisions highlighted in yellow in the 98 - Secure Identities and Access - Design Decision Points.xlsx and continue working with the customer as part of future follow-up activities and/or engagements.

    • Make sure to discuss, define, and agree with the customer on next steps in terms of follow-up activities and/or engagements. If possible, identify owners from both the customer and delivery organization, expected timelines, and resources needed. Document the next steps as part of the 10 - Secure Identities and Access - Key results, Recommendations and Next Steps.pptx presentation.
Background reading

To prepare for the delivery of the Secure Identities and Access Workshop engagement, refer to Appendix A - Readiness and Technical Content for links to relevant online learning content.
Duration and effort

  • Preparation 1 Hrs.

  • Delivery 1 Hrs.

    1. Download 1.16 Mb.

      Share with your friends:
1   ...   22   23   24   25   26   27   28   29   ...   37




The database is protected by copyright ©ininet.org 2024
send message

    Main page