Loading
Salesforce now sends email only from verified domains. Read More
Identify Your Users and Manage Access
Table of Contents
Select Filters

          No results
          No results
          Here are some search tips

          Check the spelling of your keywords.
          Use more general search terms.
          Select fewer filters to broaden your search.

          Search all of Salesforce Help
          Determine Business and User Needs for MFA

          Determine Business and User Needs for MFA

          Even though multi-factor authentication (MFA) is automatically enabled for direct logins to production orgs, we recommend looking for ways to optimize the experience for your users. If your company accesses Salesforce via single sign-on (SSO), understanding your business and users’ needs gives you insights to help define your MFA implementation. By reviewing the considerations in this topic, you can determine the most suitable MFA verification methods for your users.

          Required Editions

          Available in: both Salesforce Classic and Lightning Experience
          Available in: all editions

          Here are some questions and potential requirements to consider.

          Existing Authentication Solutions

          Does your company use an existing MFA solution, like Okta or Duo, for other systems? If your Salesforce users are already using MFA to log in to other applications, see if you can integrate your Salesforce products with the same solution. Doing so can minimize friction and change management needs because users are already trained for MFA logins.

          Are your Salesforce products integrated with an SSO solution? You can use your SSO provider’s MFA service. Or, you can use the free MFA service included in Salesforce to satisfy the MFA requirement. See Use Salesforce MFA for SSO (Salesforce Orgs) for details.

          Device Requirements

          Consider if your industry’s or company’s mobile device policies place any constraints on your MFA implementation. For example, does a mobile app-based solution work or should you provide non-mobile options, such as physical security keys or desktop authenticator apps?

          If mobile apps are an option, does your company provide corporate devices? Or must you integrate MFA data usage and reimbursement guidelines into your Bring Your Own Device (BYOD) policy?

          User Considerations

          Understand how MFA can impact the various roles and teams at your company. For example:

          • Do any of your users travel or work from locations with limited connectivity?
          • Do you have any users, such as third-party call center agents or employees with accessibility requirements, who have additional needs or restrictions regarding verification methods?
          • Which verification methods are the least intrusive to your users’ workflow?

          We recommend supporting multiple verification methods in your implementation, so each person can choose the options that work best for them.

          Shared Salesforce Credentials

          Sharing user credentials with multiple users isn’t allowed. MFA is incompatible with this practice because each user must register and connect a unique verification method to their Salesforce account before they can log in. If multiple users in your org are sharing a single account, only one person is able to log in when MFA is turned on.

          Resolve any shared accounts or credentials that are in use. Make sure you have enough licenses to set up separate accounts for each person who accesses your Salesforce org. If you need help setting up unique user accounts, contact your Account Executive or Sales team. Or refer to Salesforce Checkout and Self Service to Manage Your Account.

          Budget Consider the budget you need for operational and user support functions. Salesforce products provide MFA at no extra cost, and the Salesforce Authenticator app is free. But if a mobile app option doesn’t work for some or all users, consider setting aside some budget to purchase and distribute security keys.
          Security Requirements Work with your security and IT teams to understand how MFA aligns with your company’s security objectives and requirements. Understand if any enterprise mandates are in place, and what kinds of application testing or evaluation processes you must follow.
          Legal and Regulatory Requirements

          What are your company’s legal commitments to customers and other stakeholders around how your users authenticate to your systems?

          Also consider local and other regulatory requirements and how they can impact your MFA implementation. For example, some regulatory requirements include restrictions on downloading applications to certain devices or bringing mobile devices into certain environments.

          Compliance Requirements What kinds of audit requirements does an MFA implementation affect or trigger? Are you beginning any new compliance regimes in the next 12 months that could be affected by your MFA implementation?

          Determine Suitable Verification Methods for Your Users

          When you’ve identified what your business and users need from MFA, use your learnings to decide which verification methods to make available. You can standardize on one type of method that everyone uses, or you can support multiple options and let users choose. As a security best practice, we recommend that you require users to use phishing-resistant verification methods: built-in authenticators or security keys.

          Consider the tradeoffs when deciding your approach. When everyone uses the same method, it simplifies onboarding and day-to-day administration responsibilities. But if you have a diverse set of users with a variety of different needs, supporting the full slate of available methods is your best approach. Plus, users are less likely to get locked out of their accounts if they can set up multiple verification methods for themselves.

          See Manage Identity Verification Methods for Multi-Factor Authentication (Salesforce Orgs) for guidance on enabling methods and optimizing the registration process for your users.

           
          Loading
          Salesforce Help | Article