February 7, 2019
Multi-Factor Authentication
Authentication Assurance

Multi-Factor Authentication for Active Directory Federation Services 3.0 (ADFS 3.0)

Archit headshot
Archit Lohokare Chief Product Officer
Product Update Hero

A critical capability of a Next-Gen Access management service is the ability to protect applications and data by ensuring high levels of Authentication Assurance.  Authentication to a system is about proving the user’s identity to the system – in essence, proving that the user is indeed who the user claims to be. 

Authentication Assurance focuses on answering the basic question, “How sure is the system of the user is who the user claims to be?” The National Institute of Standards and Technology (NIST) Special Publication 800.63 lays out a suite of standards, guidelines and requirements that federal agencies can use to implement digital identity services.  Of these guidelines, the standard 800.63b focuses on Authentication and Lifecycle Management and defines the levels and requirements associated with Authentication Assurance.  These guidelines have also been the foundation of Idaptive’s industry and market leading Adaptive Multi-Factor Authentication (MFA) capabilities. 

Idaptive’s MFA Everywhere strategy aims to support all enforcement points for MFA, including all types of applications, endpoints, virtual desktops, servers, virtual private networks (VPN) and such.  Consequently, the latest release of Idaptive expands on this strategy further and now integrates with Active Directory Federation Services (ADFS) 3.0 for MFA.  ADFS customers looking to implement higher authentication assurance levels for their users as they federate into applications through ADFS can now use Idaptive’s AFDS plug-in to turn on MFA for those users.  A high-level overview of the architecture is below.


 Idaptive’s ADFS MFA plug-in supports all the authentication factors currently supported within Idaptive.  These include a one-time password delivered over SMS or email, OATH OTP codes, Security Questions (challenge/response) among others.  The screenshot below shows all the authentication factors supported within Idaptive’s Authentication Profiles capability.  


To download this plug-in and install it in your ADFS deployment, please visit the Idaptive GitHub page here.  The page includes the plug-in software as well as a detailed installation, configuration, and uninstallation manual. We’d love to hear your feedback! 

Archit Lohokare

Archit headshot
Chief Product Officer

Archit Lohokare is Chief Product Officer at Idaptive, where he is responsible for product strategy, driving innovation, and bringing new products and services to market. He transitioned over to Idaptive as it was spun-out from Centrify, where—as Vice President of Product Management—he led the Identity-as-a-Service (IDaaS) and Unified Endpoint Management product portfolio. Prior to Centrify, Archit was Vice President of Products at Optymyze, where he led the product management team responsible for the company’s Sales Performance Management and Sales Platform-as-a-Service SaaS and PaaS solutions, securing a Leadership position in the first Gartner Magic Quadrant report on Sales Performance Management along the way. 

Earlier in his career, Archit led Symantec's Cloud Information Protection Security-as-a-Service offering, and IBM's Access Management product line, comprised of Web Access Management, Identity Federation, Enterprise Single Sign-On, and Risk-based Access and Entitlements Management products. Archit joined IBM through the acquisition of Encentuate, a leading Bay Area start-up in the security software space; as an early employee, he had the opportunity to contribute to its successful exit. 

Archit has an MBA from UC Berkeley-Haas School of Business, and a bachelor’s degree in Computer Engineering from NTU, Singapore, where he was awarded the SIA-NOL undergraduate scholarship by the Ministry of Education, Singapore.

Archit is an avid history buff, enjoys reading in his spare time and running breathlessly after his one-year-old, hyperactive son.


If Archit could have any Chameleon-like superpower, it would be the ability to change colors quickly and adapt. “Actually, it would be like the ability of our IAM solutions to adapt instantaneously to a customer’s environment and user behavior. Anomalous user access? A snap! Presto, change-o – like a chameleon from green to red in an instant, adapt to the change in user behavior and request user to assure their identities using multi-factor authentication...”