Loading
Salesforce now sends email only from verified domains. Read More
Identify Your Users and Manage Access
Table of Contents
Select Filters

          No results
          No results
          Here are some search tips

          Check the spelling of your keywords.
          Use more general search terms.
          Select fewer filters to broaden your search.

          Search all of Salesforce Help
          Built-In Authenticators for MFA

          Built-In Authenticators for MFA

          Multi-factor authentication (MFA) verification is easy with a built-in authenticator service such as Windows Hello, Touch ID, or Face ID. Users can quickly verify their identity with a fingerprint, iris, or facial recognition scan (or in some cases, with a PIN or password that the user sets up in their device’s operating system). Built-in authenticators (also called platform authenticators) streamline the MFA requirement because they rely on built-in mechanisms rather than users needing a separate authenticator app or physical security key. They're also resistant to phishing attacks, making them highly secure.

          This type of method provides the easiest MFA login experience. After a user enters their Salesforce username and password, the built-in authenticator prompts them for a biometric, PIN, or password identifier. Then they’re logged in.

          Built-in authenticators are a great option if using a mobile authenticator app isn’t viable. For example, consider this option for users who don’t have a company-provided mobile device. And built-in authenticators can make sense for PCI-compliant environments or situations where a user’s work device doesn’t have ports for a physical security key.

          Important
          Important This type of verification method is tied to a user’s specific device. If a user logs in from multiple computers (for example, a desktop workstation and a laptop), they must register a built-in authenticator on each system. If built-in authenticators aren’t supported on all of a user’s systems, they must also register an alternate verification method such as Salesforce Authenticator.

          Requirements and Considerations

          Important
          Important As a security best practice, require users to use phishing-resistant verification methods: built-in authenticators or physical security keys. For more information about the security benefits of these methods, see the WebAuthn guide.
          • For products built on the Salesforce Platform, a Salesforce admin must enable the use of built-in authenticators before this option is available to users. See Enable Built-In Authenticators for Identity Verification in Salesforce Orgs.

          • Before users can register a built-in authenticator with Salesforce, the service must be enabled on their device and set up to verify their identity via a biometric, PIN, or password.

          • A user’s device, operating system, and browser must support the FIDO2 Web Authentication (WebAuthn) standard. For more information, check out the FIDO website and the WebAuthn guide.

          • A device must include a fingerprint, iris, or facial recognition scanner that’s supported by the built-in authenticator service.

          • Built-in authenticators aren’t supported in non-Chromium versions of the Edge browser.

          • Built-in authenticators can’t be used for MFA verification in the Salesforce mobile app. To log in to the mobile app, users must register an alternate verification method such as Salesforce Authenticator.

          • Built-in authenticators aren't available for Experience Cloud sites.

          • Users accessing Salesforce through an API can't verify their identity with a built-in authenticator.

          • Data Loader OAuth logins don't support the use of built-in authenticators.

          Note
          Note Built-in authenticators are currently supported in these Salesforce products only: All products built on the Salesforce Platform, Heroku, Marketing Cloud Intelligence, MuleSoft Anypoint Platform, and Tableau Cloud.

          To learn more, see FIDO2: Web Authentication (WebAuthn) or the documentation for your users' built-in authenticators.

          Behind the Scenes

          Registering a built-in authenticator creates a pair of private and public keys that are unique to the user’s account. The private key is stored safely on the user’s desktop or mobile device and is secured by the user’s biometric data. The private key and the user’s biometric data never leave the user’s device and are never shared with Salesforce. When a user logs in to their account, the browser calls the device’s operating system to launch the user’s registered built-in authenticator. Depending on the user’s browser and operating system, the user verifies their identity with an authenticator like Touch ID, Face ID, or Windows Hello.

          WebAuthn-compliant built-in authenticators are resistant to phishing and man-in-the-middle attacks. A main reason is because a user’s private key is bound to a domain associated with the user’s account. For example, let’s say a user is tricked into using a malicious site. When the site prompts the built-in authenticator to approve the login request, the authenticator recognizes that the site’s domain isn’t as expected and prevents the user from logging in.

           
          Loading
          Salesforce Help | Article