Print this page

Identity validation required for each login to Marketing Cloud

Knowledge Article Number 000220671
Description
Identity Validation stores a token in the browser's cache once the authentication has been processed. If you open a new browser, the new browser prompts the authentication process.

Each browser stores the authenticated token until one of the following occurs: 

 
  • The token expires (this is controlled in Admin | Account Settings | Security Settings | Time a device can be inactive before requiring reactivation). 
  • Browser cache/history is deleted.

If you're getting prompted to re-authenticate every time you log in, your browser might be configured to delete browsing history when closing your browser window. There are two ways to keep this from happening on a regular basis.
Resolution  

Configure your browser to not delete your browsing history upon exit 

   

Configure IP Whitelisting for the account


IP Whitelisting is an alternate method of two-factor authentication. This will authenticate the machine using the IP Address from which it's connecting. 

Once enabled, the following configuration is recommended: 

 
1. Enter your IP ranges in the Login IP Whitelist panel located in Admin | Account Settings | Login IP Whitelist. (If you're unsure of IP ranges or address to enter here, IP Addresses are logged in the ID Validation Activity Log located under Admin | Account Settings | ID Validation Activity Log.) 
2. Go to Admin | Account Settings | Security Settings, and enter the following configurations: 
 

Enterprise 2.0, all Business Units in the Enterprise

All other account types (Non-Enterprise 2.0 Accounts)

  • Restrict logins by IP Address (IP Whitelisting).
  • Set to "Log Whitelist Violations."
  • IP Whitelisting List Source - Defined at the Enterprise Level.
  • Select the check boxes:
    • Allow machines not on Whitelisted IP Addresses access. 
    • When a machine comes from inside the whitelist, do not require Identity Validation's email validation process.
  • Restrict Logins by IP Address (IP Whitelisting).
    • Set to "Log Whitelist Violations."
  • Select the checkboxes:
    • Allow machines not on Whitelisted IP Addresses access (requires Identity Validation to be enabled). 
    • When a machine comes from inside the whitelist, do not require Identity Validation's email validation process.

 




promote demote