Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

To download offline tokens from the DualShield MFA server, follow the steps below:

Table of Contents

Configure the

...

In the "config.json" file that is to be distributed with the Computer MFA Logon Agent to the users' PCs, add the value below to the "token_download_endpoint" key: 

Code Block
"token_download_endpoint": "https://your-dualshield-fqdn/sso/v1/authc/oauth/connect/downloadTokens"

You must replace "your-dualshield-fqdn" with the actual FQDN of your DualShield MFA server, e.g. "demo.la.deepnetid.com"

Below is an example:

Image Removed

offline Token Download Endpoint

Include Page
Customise Offline Token Download Endpoint
Customise Offline Token Download Endpoint

Configure the DualShield MFA Server

In your DualShield MFA server, you need to configure the following policies & settings:

  • Computer Logon Client Policy
  • Token Policy
  • SSO Service Provider for EAM 

Computer Logon Client Policy

...

Depending on the types of OTP tokens used by your users, edit the token policy, e.g. SafeID/Time-Based, and enable the option "Enable Offline Logon"

SSO Service Provider for EAM 

This step is only required if the MFA server used for the Entra-joined PC is Entra rather than DualShield, i.e. Architecture D1 & E1. Otherwise, skip this step.

Expand
titleArchitecture....

Include Page
Architectures of Computer Logon Modern Authentication
Architectures of Computer Logon Modern Authentication


You have already set up an enterprise application in your Entra ID tenant for Computer Logon MA:

(Set up an enterprise application in Entra ID for Computer Logon MA)

Also, you have already created an SSO service provider in DualShield for EAM integration:

(Create an SSO service provider in DualShield for EAM integration)

Now, in your DualShield Admin Console, edit the SSO service provider for EAM and add value of the "Token Download Application ID" option:

Image Added