ADVANCED AUTHENTICATION
Advanced Authentication is an optional module that allows for enabling Two-Factor Authentication, and/or SSO (Single Sign-On) from either Google or Microsoft Azure Active Directory. For pricing and additional information, please contact your account manager. For our Advanced Authentication video, click here.
To access and enable these settings, do the following:
- Log in to eimmigration.
- Navigate to the Administrative Tools.
- Click Application Settings.
- Click the Security tab.
MULTI-FACTOR AUTHENTICATION (2FA/MFA)
- From the security settings, check the box for Multi factor authentication. Click Save.
- The next time a caseworker logs in, they will be prompted to receive a code, either by phone or Email. Click Submit.
- By phone will send a text message code to the mobile number associated with the caseworker account.
- By Email will send a code via Email to the address associated with the caseworker account.
- Once you've received the code, enter it into the appropriate field. Choose to either remember the browser or not, then click Submit.
ENABLING SSO USING GOOGLE AUTHENTICATION
- The way the system matches users from Google and eimmigration is by user name. Therefore, in order for Google authentication to work, you must make sure your eimmigration username is the same as your Google login Email address. Once you can verify this, proceed to step 2.
- From the security settings tab, select Google as the External Authentication Provider. Click Save.
- The next time you access your eimmigration site on a new session, you'll see the Google Authentication instead of the standard eimmigration login page. Sign in using your Google account credentials.
ENABLING SSO USING AZURE ACTIVE DIRECTORY (AAD)
- From the security settings tab, select Azure Active Directory (AAD) as the External Authentication Provider, enter the required AAD items. Click Save.
- Here is a general view of the AAD setup, along with some notes:
- Set the Tenant ID and Name from the AAD portal (tenant name is the domain your AAD is bind to not the display name).
- Save and all caseworker logins would be automatically be forwarded to AAD from that point on.
NOTES:
- The way the system matches users from AAD to caseworkers is by login username, which should match AAD’s UPN (user principal name), that is their main Email address (or as shown below user name).
- You can have 2FA/MFA on with AAD on as well, you would sign in via AAD and MFA (AAD could have MFA as well).