What does a hardware key do?
Hardware keys provide another method of authentication beyond SMS messages, authenticator app notifications, and authenticator app codes. They give users the ability to login securely to a service that supports Multi-factor Authentication (MFA) without the necessity of using one of the methods mentioned above.
Why might I need a hardware key?
Some users may not wish to install what they consider company apps on their own mobile phone, therefore they may not wish to install an authenticator app to allow or deny access through MFA. If users are not required to have a corporate owned mobile phone, the hardware tokens provide a cheap and easy alternative to provide MFA authorisation.
What does a hardware token look like?
There are different types of hardware keys for different scenarios, but this is a good example of a cheap and effective hardware key. This was purchased from Token2 direct (https://www.token2.com) for around 22 Euros and comes highly recommended. I have no affiliation with Token2 (hint, hint Token2) so I do not stand to gain from recommending their tokens.
Licenses required
An Azure AD Premium P1 or P2 license is for the non-programmable hardware keys. An Azure Basic license is sufficient with a programmable key, but the installation method differs to the instructions below. See https://azure.microsoft.com/en-gb/pricing/details/active-directory/ for more information on Azure AD licensing.Setup
With Token 2, it was necessary to request a CSV file before setting up MFA for the hardware token in Azure AD. This is to provide the shared key secret which provides secure access to Azure AD using MFA. To do this navigate to https://www.token2.com/shop/page/request-secret-keys and follow the instructions on their page. This CSV file came minutes after it was requested. The file was downloaded and extracted. To edit the CSV, right click the file and click Edit this should open the file in Notepad. Do not edit it in Excel.
The CSV file shown above has been edited to include the User Principal Name (UPN) instead of the default UPN in the CSV file supplied by Token2. Some of the characters in the image above have been crossed out for obvious reasons.
Navigate to Azure Portal at https://portal.azure.com > Azure Active Directory > Security > MFA > OATH tokens and click on Upload, then select your CSV file.
Once the upload is complete the token will be shown in the portal.
The details have been obscured. If there is a problem with the CSV file, an error message will be shown.
Activation
To activate the token, you will need to provide the number off the hardware token itself so have it available. Click Activate as shown in the image below.
Turn your hardware key on if required.
If it is not successful, refresh the code and try again. Once this is complete, the user will have to change their default MFA method. To do this, get them to navigate to https://mysignins.microsoft.com/security-info.
Log in experience
Do not be put off by the clumsy phrasing of the message, the code from your hardware token will work. Enter the code and click Verify then the user will be logged in.
Comments
Post a Comment