Integrated Risk Management
Through the application of technology and automation, we'll help you manage your risks efficiently and effectively across the entire enterprise.
Related insights
Identity and Access Management
We'll help you ensure everybody within your organisation has access to the right systems and data, for the right reasons, and at the right time.
Related insights
Cyber & Application Security
Our experts will uncover security weaknesses within your security design and business-critical applications. Helping you protect your organisation from both internal and external threats.
Related insights
Bedrock Managed Service
Scalable support and on-demand expertise that seamlessly integrates with your existing operations.
Related insights
About us
A group of passionate individuals with a shared purpose to help the world's leading companies embrace best practices for GRC and risk management.
Partners
Turnkey's strategic partner network consists of selected organisations that complement our capabilities.
Corporate Social ResponsibilityCSR
We are committed to being agents for change through our Climate Action Plan, championing diversity in our workplaces, and more.
Related insights
Get in touch
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Related insights
Careers
We have operations in all corners of the globe, so see which office is nearest to you and connect with them.
Related insights
Webinars & eBooks
All of Turnkey's webinars, guides and other insights available in one place.
Related insights
Blogs
Read the latest insights from our experts on GRC and risk management, covering the latest industry topics.
Related insights
Press Coverage
See all the publications where Turnkey, our experts and our successes have been noted.
Related insights
Key events
See the key industry conferences on GRC, SAP security and risk management which we are attending.
Related insights
Case Studies
Client satisfaction is of the utmost importance to us, and we strive to constantly deliver above expectations, going the extra mile at every opportunity.
Related insights
15 July 2024

Multi-Factor Authentication (MFA) Recovery: Options and Innovations

Multi-factor authentication (MFA) is an effective and well-adopted method of preventing cyberattacks based on password theft. So, it’s not surprising that companies are increasingly utilising it when employees and other users access sensitive data. 

Mobile authenticator apps are one of the most secure and commonly used forms of MFA and are popular regardless of the vendor (Microsoft, Okta, Ping, Google, etc.). These apps provide additional verification methods to users via their mobile device, providing convenient access.   

However, during the deployment of MFA for our clients, a recurring question often arises: What happens if a user loses their phone?  

If you’ve ever lost or replaced your phone, you may have experienced this challenge for yourself. In today’s article, we explore how a user who has lost their phone can securely access an application protected by MFA, including a specific use case utilising Ping Identity tools.  

 

Balancing security and user experience in MFA recovery 

There is no single fix to the lost device problem, as is often the case with any new product deployment within an IT environment. Depending on security requirements and user experience, several different solutions could be explored: 

Enrol a second factor 

Our first recommendation would be to ensure the user enrols a second factor – usually a one-time password (OTP) by email, a hard token, or Fast IDentity Online 2 (FIDO2) – to preempt any possible device loss. This proactive measure gives the user more autonomy and avoids the need to contact the help desk.  

There are drawbacks to this approach, however: 

  • OTP by email is no longer considered secure. Moreover, some companies protect access to their employees' mailboxes with MFA, leading to a catch-22
  • Using hard token like a Yubikey comes with a prohibitively high cost, especially for large workforces
  • Using biometrics via the FIDO2 protocol (Windows Hello, for example) is not always possible. Generally, this is due to technological limitations imposed by workstations that do not support this protocol. Plus, users may be reluctant to register their biometric data on a professional device they do not control.

 Temporarily bypass MFA 

Another method that solutions like PingOne offer natively is allowing the user to bypass MFA for a certain period. Once the user has a new smartphone, they can unpair the lost device themselves, enrol the new one, and inform the help desk to reactivate MFA. Notably, in this method, MFA is disabled for all applications the user attempts to access. 

Bypassing MFA prioritises user experience at the expense of access security. This method also requires work from the help desk – both in supporting users in the process and in tracking those who deactivate MFA and preventing them from bypassing it even after enrolling a new device. 

Contact the help desk 

Perhaps the most obvious and simplest method is having the user contact the help desk to get assistance with unpairing the lost device. This will allow the user to enrol their new device, if they have one available, at the next login.  

Again here, the solution is dependent on the help desk. We must also consider the need to verify the identity of the person contacting support. What if a cybercriminal poses as an employee who has lost their MFA factor to enrol their own device maliciously? This situation becomes particularly concerning if the company's main authentication system is passwordless and therefore relies solely on MFA. 

 

Streamlining MFA recovery with PingOne DaVinci & PingOne Verify  

Recognising the drawbacks to each of these options, Ping Identity has introduced a new set of tools to automate the recovery process, enhance user experience, and guarantee high security. 

The first tool is PingOne DaVinci, a solution that allows for the easy creation of authentication journeys using connectors with prebuilt functions. These connectors, placed sequentially and linked via a drag-and-drop system, allow for customised authentication journeys with little to no coding required. 

This tool can be combined with PingOne Verify, a cloud service capability, which utilises facial recognition from an ID document or a live selfie. Here’s how they work together.

 

Using PingOne DaVinci & PingOne Verify in practice  

Let's consider a hypothetical scenario with the following conditions: 

  • The user has lost their only means of validating MFA, which was their PingID mobile app. They can no longer access protected applications. 
  • The user has bought a new smartphone, but it is not yet registered. 
  • The user cannot access the device management page to enrol their new device, as this page requires MFA validation. 
  • We want to avoid involving the help desk for the reasons explored above. 

The DaVinci flow enables us to organise the recovery and reenrollment process in two main steps:  

  1. Verify the user's identity with PingOne Verify. 
  2. Unpair the lost smartphone and start the enrollment process for the new device. 

Let’s break down those steps in more detail: 

  1. The user connects to a dedicated PingOne URL for managing lost factors from their workstation.
  2. The user authenticates using their username and password.
  3. A QR code appears on the user's workstation, which they scan with their new phone.
  4. On this phone, the browser opens and prompts the user to take a live selfie.
  5. Once PingOne Verify captures the selfie, it is compared with a pre-registered photo of the user.
  6. If the identity matches, DaVinci automatically unpairs the user's previous smartphone.
  7. The user is then prompted to enrol their new device.
  8. The user will now be able to access any applications protected by MFA. 

 

In summary: Simplifying MFA recovery 

While there are a variety of options for MFA recovery, most methods to date come with drawbacks. Together, PingOne DaVinci and PingOne Verify offer an all-around effective alternative solution.  

From a business perspective, combining these tools streamlines operations and improves the user experience without compromising security. Specifically, it allows companies to relieve help desks, which are often overwhelmed by multiple requests for lost factors. It gives users more autonomy, enabling them to avoid interruptions and remain productive. And perhaps most importantly, it’s ideal from a security standpoint, as MFA requirements are maintained. 

Are you interested in exploring MFA solutions for your organisation? Contact us today