Create authentication flows
An authentication flow determines how a user authenticates.
IDaaS supports the following authentication flows:
● User
Login—The
user enters their user ID and is prompted to authenticate using any of
the IDaaS authenticators.
● Smart
Login—The
user interacts with an Entrust Identity Smart Credential to authenticate. The
user does not enter their userID because authentication involves a passwordless
authentication flow. The user
ID is obtained from the Smart Credential.
Smart Login is available only if the account
has been enabled to allow Smart Login. Smart Login can be used to authenticate
to the Identity as a Service Admin Portal, User Portal, OIDC, and SAML
applications integrated with Identity as a Service.
Note: Entrust recommends that User Login flow
should also be enabled when Smart Login is selected in an authentication
flow.
● Passkey—The
user authenticates with a FIDO2/Passkey token. The user does not
enter their user ID because authentication involves a passwordless authentication
flow. The user ID is obtained from the FIDO2/Passkey token.
● Identity
Provider—The
user is forwarded to an external SAML or OIDC Identity Provider to authenticate.
The user ID is provided by the Identity Provider.
● User
Certificate—The
user authenticates with a user certificate. The user does not enter
their user ID because authentication involves a passwordless authentication
flow. The user ID is obtained from the user certificate.
When you create a resource rule, you need to select
an authentication flow for the rule. You can select to use a system authentication
flow or create a custom flow. IDaaS has the following pre-configured System
Authentication Flows:
● Access
Denied
User Login flow configured
with First Factor Access
Denied
and second-factors None. Used in
the default User Portal and Administration Application resource rules.
● Default
Second Factor Only
User
Login flow configured with First Factor Skip
Password
and second-factors One
Time Password (OTP), Mobile Smart Credential Push,
FIDO2/Passkey,
Entrust
Soft Token Push,
Software/Hardware
Token,
and Grid Card. Used in the default User Portal and Administration
Application resource rules.
● Domain-based
IDP Only
Identity Provider login
flow configured with Use Domain-based Identity Providers
enabled requires users to log in only using Identity Providers associated
with the user's domain. Optionally, Enable Second
Factor
for Identity Provider can also be enabled to require users
to perform second factor authentication in addition to the domain-based
IDP login.
● Entrust
Soft Token Push, Software/Hardware Token, One Time Password
User Login
flow configured with First Factor Skip
Password
and second-factors One Time Password (OTP), Entrust Soft Token Push, and
Software/Hardware Token. Used in Entrust IdentityGuard legacy integrations.
● External
and Second Factor
User
Login flow configured with First Factor External
Authentication
and second-factors One Time Password
(OTP),
Mobile
Smart Credential Push,
Entrust
Soft Token Push,
and Software/Hardware Token, Grid
Card,
Temporary
Access Code,
and Knowledge-based authenticator. Used for
API, SAML, and OIDC integrations.
● External
Only
User Login flow configured
with First Factor External
Authentication
and second-factors None. Used in
resource rules when you want users to only perform external authentication
when the risk is low (for example, Entrust Identity Desktop for Windows).
● Passkey
Only
Used in applications
that only support Passkey.
● Password
and Second Factor
User
Login flow configured with First Factor Password and second-factors
One Time Password (OTP), Mobile Smart Credential Push, Passkey/FIDO2,
Entrust Soft Token Push, Software/Hardware Token, and Grid Card. Used
in Generic RADIUS non-EAP applications.
● Password
and Software/Hardware Token
User Login
flow configured with First Factor Password and second-factor
Software/Hardware
Token.
Used in RADIUS one-step resource rules.
● Password
and Software/Hardware Token, Temporary Access Code
User Login
flow configured with First Factor Password and second-factors
Software/Hardware
Token
and Temporary Access Code. Used in
RADIUS EAP MSChapv2 and RADIUS one-step.
● Password
Only
User Login flow configured
with First Factor Password and second-factors
None. Used
in resources rules where you want users to only enter a password when
the risk is low.
● Smart
Login Only
Used
in applications that only support Smart Login. The list of flows only
has Smart
Login enabled.
● Software/hardware
Token and Temporary Access Code
User Login
flow configured with First Factor Skip
Password and
second-factor Software/Hardware Token and Temporary
Access Code.
Used in RADIUS one-step and RADIUS EAP MSChapv2 resource rules.
● Software/Hardware
Token Only
User
Login flow configured with First Factor Skip
Password and
second-factor Software/Hardware Token. Used in
RADIUS EAP MSChapv2 resource rules.
● User
Certificate Only
Used
in applications that only support User Certificate.
Manage Authentication Flows

Delete
an authentication flow