5.1.2 Considerations Before Configuration

Follow these guidelines to begin implementing multi-factor authentication for any event:

  1. Identify the authentication methods that you want to configure.

  2. Determine the order of methods in the chain. The methods are displayed to the end user in the order that you have configured.

  3. Determine the policy that must be configured for the identified method.

  4. Identify the user group for which you want to enforce this authentication chain.

Configuration Flow in Advanced Authentication for RADIUS Server Event

The following diagram illustrates the sequential flow of actions required for securing the Open VPN client with multi-factor authentication: