Machine-based MFA
Machine-based MFA is a setting intended to protect business-critical machines in an organization by preventing them from being compromised.
Note: Machine-based MFA requires the Professional Edition of ADSelfService Plus with Endpoint MFA. If you do not have these, machine-based MFA will not be enforced.
How does Machine-based MFA work?
When machine-based MFA is enforced for a particular machine, any user accessing the machine has to prove their identity using MFA to log in successfully. The MFA authenticators in the prompt will be based on the authenticators configured for the user in the MFA for Machine Login section. These settings differ from policy-based machine MFA settings, as these are meant to secure sensitive machines under any circumstance, i.e., MFA will be enforced on the selected machines irrespective of the enrollment status of the user attempting to log in or the availability of the ADSelfService Plus server.
Note: To set up policy-based settings that apply to users not machines, please click
here.
When this setting is enabled, users will not be allowed to log in to the machine on which machine-based MFA is enforced if:
- The ADSelfService Plus server is not reachable.
- The user account is restricted in ADSelfService Plus.
- The user does not belong to any policy that has MFA for Machine Login configured.
- The user has not enrolled for any of the authenticators configured in the MFA for Machine Login (both online and offline MFA) section, regardless of whether the Force Enrollment option is enabled for the user policy.
- The user license consumption limit has been exceeded or Endpoint MFA has not been purchased. To purchase Endpoint MFA, click here.
However, users who have selected the Trust this machine setting on the login screen will be allowed to log in to the machine without performing MFA for the specified duration after their initial identity verification.
Note: Make sure to update the login agent to the following latest versions for proper enforcement of MFA: Windows 5.10, macOS 1.7, or Linux 2.4 and above. If an older version of the login agent is installed on the machine, and the ADSelfService Plus server is not reachable, the user will be allowed to access the machine if the Skip MFA when ADSelfService Plus server is down or unreachable option is enabled.
Steps to enforce Machine-based MFA
- Navigate to Configuration > Administrative Tools > GINA/Mac/Linux (Ctrl+Alt+Del) > GINA/Mac/Linux Installation > Installed Machines.

- Select the required domain from the drop-down list.
- Select the machines on which you want to enforce machine-based MFA.

- Click Manage MFA and select Enforce.

Steps to exempt a machine from Machine-based MFA
- Navigate to Configuration > Administrative Tools > GINA/Mac/Linux (Ctrl+Alt+Del) > GINA/Mac/Linux Installation > Installed Machines.
- Select the required domain from the drop-down list.
- Select the machine that you want to exempt from machine-based MFA.
- Click Manage MFA drop-down and select Exempt.

Advanced Machine MFA Settings
ADSelfService Plus allows admins to enable MFA during specific usage scenarios for Windows machines. To request this feature for Mac or Linux, click here.
The authenticators in the prompts for the enabled scenarios will be based on the MFA factors configured in the MFA for Machine Login section. The settings enabled here will be applied to all Windows machines where the ADSelfService Plus login agent is installed.
Note: These settings pertain only to Windows machines. Advanced Machine MFA settings ensure that the machine will be secured with MFA under any circumstance, i.e., MFA will be enforced regardless of the enrollment status of the user who attempts to log in to the machine or when the ADSelfService Plus server is unreachable. Users who attempt to log in to the machine will be prompted for MFA based on the
authenticators they have enrolled in as per their policy.
Windows MFA settings
- Enable MFA during interactive logons to Windows machines via the GUI:

When this setting is enabled, MFA will be required during interactive or GUI-based logins on Windows machines. Users will be able to perform subsequent actions only upon successful identity verification.
Note: MFA for interactive logins to Windows servers requires the Professional edition of ADSelfService Plus with Endpoint MFA. If you do not have these, MFA will be bypassed on Windows servers.
- Enable MFA for User Account Control: When this setting is enabled, MFA will be required for all User Account Control (UAC) credential prompts, and the user will be able to perform the desired action only upon successful identity verification. This setting is compatible with Windows 7 and above and Windows Server 2008 and above. This setting is supported by version 5.10 and above of the ADSelfService Plus Windows login agent.
Note: MFA for UAC on Windows machines requires the Professional edition of ADSelfService Plus with Endpoint MFA. If you do not have these, MFA will be bypassed on Windows machines.

Note: Actions performed by selecting the Run as a different user option will not require credentials as prompted for by other UAC actions.

- Enable MFA for Remote Desktop access on Windows machines during: The admin can configure MFA to be required when establishing connections with machines through the RDP. This will ensure that RDP connections to machines are secured with an additional layer of authentication.
Note: MFA for RDP access to Windows machines requires the Professional edition of ADSelfService Plus with Endpoint MFA. If you do not have these, MFA will be bypassed during RDP logins to Windows machines.
There are two ways in which MFA can be configured for Remote Desktop access:
- RDP server authentication: When this setting is enabled, all incoming Remote Desktop connections to Windows machines where the ADSelfService Plus login agent is installed will be authenticated and protected using MFA.
- RDP client authentication: This setting can be enabled to require MFA for all outgoing Remote Desktop connections via the Windows Remote Desktop application (mstsc.exe) on machines where the ADSelfService Plus login agent is installed. This setting is supported by version 5.10 and above of the ADSelfService Plus Windows login agent. This setting is applicable for Windows 7 and above and Windows Server 2008 R2 and above.
Select Enable MFA for Remote Desktop access on Windows machines during and check the RDP server authentication or RDP client authentication check boxes based on the scenario for which you want MFA to be required.

Note: Enabling both RDP server and RDP client authentication may lead to double verification if the ADSelfService Plus login agent is installed on both the server and client machines. For example, if Google Authenticator is the configured MFA authenticator, and both RDP server and client authentication are enabled, then the user will be required to perform identity verification using the code both before and after establishing a connection with the remote machine.
- To enable MFA for RDP client authentication, the following prerequisites need to be satisfied:
- Network-level authentication needs to be enabled. You can enable network-level authentication via Group Policy by navigating to Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security.
- To require MFA for Remote Desktop connections in a multi-forest AD environment, there must be a trust relationship between the two domains. Domain trusts can be added between forests either through a forest trust (i.e., a trust relationship at the forest level) or through an external trust (i.e., a trust relationship at the domain level). For steps to configure a trust relationship, please refer to this document.
Note: With RDP client authentication, you can protect remote access using MFA only for users accessing the machine from the internet or other public IP addresses via Remote Desktop Gateway (RD Gateway) by configuring a conditional access rule with IP restrictions. Learn more about
conditional access here.
- Enable MFA when unlocking Windows machines: Enabling this setting will enforce MFA during Windows machine unlocking.
Note: MFA for Windows machine unlocks requires the Professional edition of ADSelfService Plus with Endpoint MFA. If you do not have these, MFA will be bypassed during Windows machine unlocks.
