{"id":52708,"date":"2022-06-06T11:00:00","date_gmt":"2022-06-06T15:00:00","guid":{"rendered":"https:\/\/live-jc-marketing-site.pantheonsite.io\/?p=52708"},"modified":"2023-02-09T20:22:58","modified_gmt":"2023-02-10T01:22:58","slug":"push-notification-mfa-using-jumpcloud-protect","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/push-notification-mfa-using-jumpcloud-protect","title":{"rendered":"One-Touch, Frictionless Multi-Factor Authentication Using JumpCloud Protect"},"content":{"rendered":"\n
The world\u2019s workforce has turned to remote work, resulting in employees accessing corporate resources from home and public networks. To Make (Remote) Work Happen, IT admins need a way to provide their employees with secure access to the resources they need to do their jobs without disrupting their day (perceived or otherwise) on whatever service they\u2019re accessing.<\/p>\n\n\n\n
Passwords alone are not enough<\/a> to secure these resources and prevent unauthorized access, as they can be easily compromised by brute force, phishing, and other techniques, potentially resulting in monetary losses for organizations. IT administrators have to introduce additional security measures to protect their organization’s resources.<\/p>\n\n\n\n Multi-factor authentication (MFA)<\/a> provides such a measure that safeguards organizational resources and reduces the risk (and cost) associated with password compromise. It\u2019s a foundational security control for identity and access management (IAM) that can combine with conditional access<\/a> to ensure that unmanaged devices from unauthorized locations won\u2019t be granted access to vital IT resources.<\/p>\n\n\n\n The inclusion of MFA to IAM configurations adhere to the cybersecurity requirements that are issued by international standards bodies such as ISACA, ISO\/IEC, NIST, and PCI SSC. These mature standards exist to safeguard confidential and private information from bad actors.<\/p>\n\n\n\n However, implementing MFA<\/a> can be a difficult proposition, for both technical and political reasons. On the technical side, there are many options to choose from, both free and paid, which can be difficult to implement and may only cover a subset of IT resources depending upon their specific requirements and capabilities. In addition, end users may be resistant to adopt MFA, especially if the process to verify additional factors is cumbersome, unreliable, or persistent.<\/p>\n\n\n\n IT admins can leverage JumpCloud Protect to extend MFA beyond cloud applications and secure all endpoints and resources, including on-premise applications, Mac, Windows, and Linux desktops, VPN and wireless networks, and servers.<\/p>\n\n\n\n With JumpCloud Protect, IT admins can achieve:<\/p>\n\n\n\n JumpCloud\u2019s admins and end users can download JumpCloud Protect from the Apple App Store<\/a> and Google Play Store<\/a>.<\/p>\n\n\n\n JumpCloud uses clear, accessible language<\/em><\/p>\n\n\n\n End users can self-enroll and activate their device through JumpCloud\u2019s User Portal, and they have two options they can select as a second factor: Biometric<\/strong>, Push<\/strong>, and TOTP<\/strong>. <\/p>\n\n\n\n End users can use JumpCloud Protect (Biometric, Push, and TOTP) as a factor for the following scenarios:<\/p>\n\n\n\n Additionally, users can add JumpCloud Protect TOTP as a second factor to their personal online accounts that support this factor.<\/p>\n\n\n\n JumpCloud Protect provides the highest level of security in terms of mobile app storage and communication.<\/p>\n\n\n\n Additionally, communication and data exchanged between the mobile app and JumpCloud servers happens over a secure channel.<\/p>\n\n\n\n JumpCloud Protect <\/sup>is natively integrated with JumpCloud\u2019s Cloud Directory Platform, unlike traditional point MFA solutions that are inserted into the access transaction, adding additional overhead to integrate and maintain. Because of this, JumpCloud Protect provides a second layer of security to support device login (across Windows, macOS, and Linux), Admin portal login, RADIUS and LDAP application access.<\/p>\n\n\n\n JumpCloud Protect gives both IT and security teams a path to protection without overcomplicating their infrastructure. For employees, an intuitive, easy-to-use method with less user friction for enrollment and authentication is presented, thereby increasing the chances of adoption and limiting the need for ongoing technical support.<\/p>\n\n\n\n IT admins can use JumpCloud Protect as an MFA solution to implement push notifications and TOTPs, for iOS and Android mobile devices.<\/p>\n","protected":false},"author":148,"featured_media":52982,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[2781,42,2337],"tags":[2403,2411,2383,2408,2379,2409,2374],"collection":[2775],"platform":[],"funnel_stage":[3014],"coauthors":[2570,2535],"class_list":["post-52708","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","category-news","category-remote-work","tag-jumpcloud-protect","tag-jumpcloud-sso","tag-multi-factor-authentication-mfa","tag-push-notifications","tag-radius","tag-totp","tag-zero-trust","collection-security","funnel_stage-bottom-funnel"],"acf":[],"yoast_head":"\nMFA Doesn\u2019t Have to Be Difficult<\/h2>\n\n\n\n

MFA combats the growing challenges associated with mitigating cyberattacks, as well as those associated with rolling out Zero Trust security tools to end users who may be resistant to the increased requirements to access their resources. IT admins can use JumpCloud Protect as an MFA solution to implement biometric authentication<\/a> (Touch ID), mobile push notifications<\/a>, and time-based, one-time passwords (TOTPs)<\/a>. It\u2019s available as an iOS and Android mobile app, and natively backed by JumpCloud\u2019s Directory Platform.<\/p>\n\n\n\n
<\/a><\/p>\n\n\n\nJumpCloud Protect: Biometric, Push, and TOTP Authentication<\/h2>\n\n\n\n
\n
How Do End Users Use JumpCloud Protect for MFA?<\/h2>\n\n\n\n
<\/figure>\n\n\n\n\n
<\/figure>\n\n\n\n\n
<\/figure>\n\n\n\nWhat Resources Does JumpCloud Protect Support?<\/h2>\n\n\n\n
\n
How Secure Is JumpCloud Protect?<\/h2>\n\n\n\n
\n
Why Should Customers Enable JumpCloud Protect?<\/h2>\n\n\n\n
<\/p>\n","protected":false},"excerpt":{"rendered":"