Login Conditions for Login Policies

You can configure an authentication method for each of the following elements.

Authentication methods can be configured for both trusted networks and non-trusted networks.

OptionDescription
First ElementSelect the first authentication method.
Second ElementSelect an authentication method after having successfully authenticated the first element.
If not selecting, login will be successful only upon authentication of the first element.
Third ElementSelect an authentication method after having successfully authenticated the second element.
If not selecting, login will be successful when authentication of the second element is complete.
[ Reference ]

If multiple authentication methods have been selected for the first or second element, the user can select which of the authentication methods to be used for login.
Refer to "When the Authentication Method Selection Screen Appears" in "IIJ ID Service Manual [For Users]" for more information.

The authentication methods that can be selected with the login rule are as follows.

OptionDescriptionComments
FIDO2Authentication is performed using a device supporting FIDO2 (for example, a security key such as Security Key by Yubico and Windows Hello).
You can set it for the first element or second element.
Requires subscription to the Multi-Factor Authentication Option.
PasswordAuthentication is performed using the password registered with IIJ ID.
You can set it only for the first element.

Upstream ID provider (Upstream IdP)

Authentication is performed using the upstream ID provider.
You can set it only for the first element.
If upstream ID provider authentication is configured, you cannot set any other authentication methods for the first element.

Requires a contract for the Premium Federation Option or Integrated Windows Authentication.
The upstream ID provider(s) must also be registered. Refer to "Adding Upstream ID Providers" for more information.
Email one-time password (Email OTP)Authentication is performed using the one-time password that is sent to the notification email address.
You can set it for the first or second element.
Requires subscription to the Multi-Factor Authentication Option.
Device certificateAuthentication is performed using the key pair (certificate and private key) of the device certificate.
You can set it for the second or third element.
Requires subscription to the Multi-Factor Authentication Option.
SmartKeyAuthentication is performed using the IIJ SmartKey application.
You can set it for the second element only.
Requires subscription to the Multi-Factor Authentication Option.

When you configure FIDO2 as the authentication method, the following options can be set in addition.

OptionDescriptionComments
Allow security key registration at loginYou can display the registration screen for security keys at the time of FIDO2 authentication. (You cannot display it if you have already reached the maximum number of registered security keys.)
We recommend temporary use of this option, such as enabling this option only until the initial login of a new user is completed. (Using this option for a long period of time will increase risk of registering malicious attackers’ security keys.)
Requires subscription to the Multi-Factor Authentication Option.

Require the user verification feature using security keys

Makes checking of the security key by a user verification feature (PIN, fingerprint authentication, etc.) mandatory.
Security keys that do not support the user verification feature will no longer be used.
Requires subscription to the Multi-Factor Authentication Option.

When you configure a device certificate as the authentication method, the following options can be set in addition.

OptionDescriptionComments
Allow device registration at login (only when IIJ ID Service CA is used)The device registration screen is displayed when a device that does not have a key pair for the device certificate attempts to log in. (You cannot display it if you have already reached the maximum number of registered devices.)
We recommend temporary use of this option, such as enabling this option only until the initial login of a new user is completed. (Using this option for a long period of time will increase risk of registering malicious attackers’ security keys.)
Requires subscription to the Multi-Factor Authentication Option.

The following options can be selected for the login rule for non-trusted networks.

OptionDescription
Do not allow loginDo not allow login
When you select "Do not allow login," you cannot configure authentication methods.
Allow loginYou can log in using any of the authentication methods.
When you allow login, you need to configure the authentication methods.