Using Token2 Security keys for Silverfort

Silverfort offers a unified identity protection platform that consolidates security controls across corporate networks and cloud environments to effectively block identity-based attacks. Utilizing agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions—including AD, ADFS, RADIUS, Azure AD (Microsoft Entra ID), Okta, Ping, and AWS IAM—extending their coverage to assets such as homegrown and legacy applications, IT infrastructure, file systems, command-line tools, machine-to-machine access, and more. Silverfort also extends MFA to any sensitive resource, including those that were previously unprotected.
You can configure a FIDO2 service in Silverfort to support FIDO2 tokens for either a cloud-based service or an on-premises service, which is ideal for deployments with limited or no access to the cloud. In this guide, we will outline the steps needed to configure Token2 Security keys as a FIDO2 authentication method for two-step verification.

Requirements:

• An access to the Silverfort admin console.
• Admin access to enable security keys (not required if security keys are already enabled)
• Modern browser supporting security keys.
• A Token2 FIDO security key.
• Silverfort Desktop App or the Silverfort Chrome extension to approve MFA requests.

Enable an MFA method

You can configure a FIDO2 service in Silverfort, to support FIDO2 tokens. You can configure a cloud-based service, or an on-prem service (for deployments with limited or no access to the cloud.Follow these steps to configure a FIDO2 service, either cloud-based, or an on-prem.
1. On the 'SETTINGS' page, select 'MFA Tokens,' and then click on the 'On-prem FIDO2' tab.




2. Set the FIDO2 RP ID and FIDO2 Origin settings based on whether your configuration is cloud-based or on-premises.




Where 'silverfort-fido2' resolves to the Admin Console.

3. To register a FIDO2 key, open the address 'https://FiDO2 Origin/register' in a browser. For example, for an on-premises service, this would be 'https://silverfort-fido2.FQDN', while for cloud-based services, you can use either 'https://fido2.silverfort.com/register' or 'https://sgfido2.silverfort.com/register'.




4. Enter your email address, then click 'Send Verification Code.' This email is used to identify the user associated with the token.
NOTE: You can register a FIDO2 token using an external email address only for the on-prem FIDO2 option. For the cloud-based option, the email must be in the AD.

5. Check your email for a message like this and copy the verification code.




6. Insert your FIDO2 key and touch it. This action will generate a unique public and private key for the token, enabling its use.




Use FIDO2 tokens in Silverfort authentication policies

After enrolling the security key, we need to assign FIDO2 to Silverfort authentication policies. When a user in the policy attempts to access a resource, a message will be displayed in the Desktop App or Chrome extension, prompting them to approve the MFA using their token.
1. In the POLICIES page, edit the settings for existing policy.




2. Go to the 'Action' section, select 'MFA'.Then assign 'FIDO2' to the 'Tokens' parameter.




3. Specify the 'MFA Prompt Display Name' template as the message displayed in the Desktop App or Chrome extension.
4. In the 'Advanced options,' choose a value for 'Require MFA': either every time or after a certain duration.




Now, when the policy is in effect, you will see a window in the notification area like the one below.




Insert the FIDO2 key and click 'Authenticate'. You will then be redirected to the Silverfort authentication page.




Touch the key to continue, and you will successfully gain access to the resource.


Key Benefits

Extend Token2 FIDO2 MFA Everywhere

Secure access to all resources, on-prem or in the cloud, including those that could not be protected until now.

Advanced Risk Analysis

Evaluate the risk of each access attempt based on the user’s full context.

Real-Time Protection

Detect and prevent advanced identity-based attacks across your entire environment.

Consistent User Experience

Provide users with a single MFA solution when requesting access to any resource, on-prem or on the cloud.

No MFA Fatigue

Ensure users are required to respond to an MFA only when Silverfort’s risk engine detects irregular activity