Multi-Factor Authentication (MFA) Validation for Nexus Connections

This document is intended for customers who use SAML Authentication in CPAM and need to validate their internal MFA requirements for Nexus connections. If your users authenticate with Local Authentication or AD/LDAP Authentication, CPAM can meet Nexus MFA requirements through the Mobile Authentication option without additional configuration. Navigate to Settings > Passwords & Accounts > Authentication Requirements section to configure.

IMPORTANT:
CPAM uses email authentication as an employment verification only. This option is not considered a valid secondary authentication for Nexus MFA Validation.

For customers whose users authenticate to CPAM using SAML Authentication with an SSO redirect to an internal Identity Provider (IdP), this document explains how to configure CPAM to validate your IdP’s existing MFA requirements.

When SAML Authentication is enabled, CPAM defers all authentication tasks to your internal IdP. The IdP performs both primary and MFA steps. CPAM then evaluates the SAML assertion returned during SSO and checks the AuthNContext Reference values provided by the IdP to confirm that MFA was completed before granting access to CPAM.

For CPAM customers using the Nexus to connect to VPAM applications, improper configuration of SAML Settings could result in locking users out completely. To minimize potential downtime, Imprivata recommends the following:

  • Test your SAML Configuration settings in a sandbox server, if available.

  • Ensure you have a locally-authenticated break-glass account with CPAM System Administrator permissions that is not a member of any internal groups recognized by your internal IdP.

Identifying Nexus Connection MFA Validation Requirements

When a Nexus VPAM Customer is enforcing MFA Validation for Nexus Connections, but your CPAM server is not configured with local MFA or to validate internal IdP MFA using SAML, your CPAM server displays the following error when a CPAM user is denied connection to a Gatekeeper.

User Lockout Message

This topic explains how CPAM System Administrators can configure their existing SAML Configuration to validate that their existing internal IdP's MFA requirements have been met. This ensures that users connecting to Nexus Gatekeepers meet the MFA requirements enforced by Nexus VPAM Customers.

Supported SAML Protocol AuthN Context References

Imprivata does not build support for individual third-party Identity Providers (IdPs). Instead, Imprivata supports the underlying SAML 2.0 protocol, which each IdP implements in its own way. Because IdPs may treat SAML AuthNContext references differently (some using them as primary authentication, secondary authentication, or both) CPAM provides Advanced SAML Settings that allow administrators to define which AuthNContext values should count as valid MFA. During the SSO redirect to your internal IdP, CPAM checks the user’s SAML assertion for one of the approved secondary-authentication AuthNContext references.

The following IdP AuthN Context Reference options are currently supported in VPAM and CPAM as valid MFA responses:

Identity Provider (IdP) SAML AuthNContext Reference Description
Microsoft Entra ID http://schemas.microsoft.com/claims/multipleauthn Indicates MFA validation through Entra ID.
REFEDS https://refeds.org/profile/mfa Federation standard for multi-factor authentication.
Stanford https://www.stanford.edu/ids/mfa Stanford-specific MFA context.
MobileTwoFactorContract urn:oasis:names:tc:SAML:2.0:ac:classes:MobileTwoFactorContract Recognized as valid MFA (two-factor mobile contract).
MobileTwoFactorUnregistered urn:oasis:names:tc:SAML:2.0:ac:classes:MobileTwoFactorUnregistered Valid MFA using unregistered two-factor mobile method.
X.509 urn:oasis:names:tc:SAML:2.0:ac:classes:X509 Indicates authentication via X.509 certificate.

If your IdP uses a different AuthNContext, contact support@imprivata.com.

Requirements

Before making adjustments to your SAML settings to validate IdP MFA, ensure you meet the following requirements:

  • You are a system administrator of the server.

  • You are a system administrator to the organization’s IdP (such as Entra ID, Okta, ADFS, or REFEDS).

  • You have configured at least one secondary method at the IdP level.

  • You have already configured SAML Authentication in your server under System Admin > Settings > SAML Settings.

  • You have access to at least one locally-authenticated break-glass account with System Administrator role or similar permissions.

You may incur in additional requirements depending on your IdP.

Step-by-Step Configuration

IMPORTANT:
Before making any adjustments to your CPAM server SAML Configurations, confirm the following topics with your internal IdP SAML Subject Matter Expert:
  • Your IdP is configured to require MFA for internal users.
  • Your IdP is able to return one of the supported SAML AuthN Context Reference options during SSO.

After you confirm requirements with your internal SME, navigate to System Admin > Settings > SAML SettingsAdvanced Settings using a locally-authenticated break-glass account and follow these steps:

  1. Set the Required authentication level to exact.

  2. Select the AuthN Context Reference option that corresponds with your internal IdP's secondary authentication requirement.
    Read the Supported Identity Providers and MFA Contexts for more information.

  3. Submit your SAML settings to confirm that SSO still allows users to authenticate and log into CPAM.
    If SSO is unsuccessful, use the local system administrator account to log into CPAM and revert the SAML configuration to the original settings.

    After you confirm the SSO login is successful, continue to step 4.

  4. Check the Require MFA Validation from IdP for SSO Users box.


Verify Your SAML Configuration Changes Before Connecting to a Nexus Gatekeeper

To test and validate your MFA implementation, follow these steps:

  1. Click Submit to the changes you made in System Admin > Settings > SAML Settings.

  2. Log out of your server.

  3. Select Authenticate with Single Sign-On in the login page.

  4. Authenticate using your IdP credentials.

  5. Navigate to System Admin > Admin Log.

  6. Open the User Activity tab and locate your login event.

  7. Review the event details in the Authentication column.

The following image contains an unsuccessful implementation:

The highlighted flag must display the following to be succesful:

SAML with MFA: Yes

Troubleshooting and Recovery

Errors during SAML configuration or MFA validation typically occur when:

  • The Identity Provider (IdP) does not transmit an MFA-compliant AuthNContext reference.

  • The Required authentication level or Auth Context reference is misconfigured.

  • Metadata or certificates are outdated.

  • Users are locked out due to SAML enforcement without a local administrator fallback.

The following sections cover the most common recovery steps: