5.2.2 Points to Consider Before Configuration

Consider the following guidelines before you begin implementing multi-factor authentication for the Windows logon:

  1. Identify the authentication methods that you want to configure.

  2. Determine the order of methods in the chain. The methods are displayed to the end user in the order that you have configured.

  3. Determine the policy that must be configured for the identified methods.

  4. Identify the user group for which you want to enforce this authentication chain.

Configuration Flow in Advanced Authentication for Windows Logon Event

The following diagram illustrates the sequential flow of actions required for securing the Windows workstation with multi-factor authentication: