UseCase7_MFA_GoogleAuthenticator - sandersdHES/PAMEmergingTech GitHub Wiki

6.7 Enabling MFA with Google Authenticator in PAM360 accounts

Objective

This use case demonstrates how to configure Multi-Factor Authentication (MFA) in PAM360 using Google Authenticator. The goal is to enhance login security by requiring a time-based One-Time Password (OTP) in addition to a user’s credentials.

Context

With increasing risks of credential theft and brute-force attacks, relying solely on usernames and passwords is no longer sufficient. Two-Factor Authentication (2FA) strengthens your PAM360 instance by adding a dynamic authentication layer. In this guide, we’ll use Google Authenticator as the 2FA method.

Prerequisites

  • You must have admin access to PAM360.
  • PAM360 must already be installed and running on your Azure VM.

Step 1: Log in to PAM360 as Administrator

Access your PAM360 web portal, e.g.:

https://<your-pam360-server>:8282

Step 2: Choose Google Authenticator as Your 2FA Method

  • Go to Admin > Authentication > Two-Factor Authentication
  • Click “Enable Two-Factor Authentication”
  • From the available options, select Google Authenticator
  • Click Save to confirm the configuration
  • Choose Google Authenticator as your 2FA method.
  • Save the configuration.

image.png

Step 3: Assign MFA to Specific Users

  • Under the same menu, go to “Configure Users”.
  • Select the users who should use MFA.
  • Click “Enroll” for each user.

image.png

Step 4: First-Time Login for Users

The next time a user logs in:

  • PAM360 will show a QR code.

  • User must scan it using the Google Authenticator app on their phone.

  • They’ll enter the 6-digit OTP to complete login.

    image.png

Step 5: (Optional) Enforce MFA for All Users

To make MFA mandatory across the platform:

  • Go to Admin > Authentication > Two-Factor Authentication
  • Enable the toggle: “Enforce for all users”

This ensures every user must authenticate with an OTP.

Conclusion

With MFA enabled via Google Authenticator:

  • Every login now requires a valid OTP in addition to the password
  • This adds a robust layer of protection against stolen or leaked credentials
  • PAM360 becomes more resilient to unauthorized access attempts

This simple but powerful step significantly strengthens your security posture.

⚠️ **GitHub.com Fallback** ⚠️