Access Control
SecTrail MFA provides comprehensive access control policies based on location, time, IP address, and user behavior.
Policy Types
Geo-Location Policies
Access control based on the user's geographical location.
- GeoIP Database: Automatic country/city detection
- Whitelist/Blacklist: Allow or block specific countries
- Granular Control: Application or user-based policies
Time-Based Policies
Restricting authentication to specific timeframes.
- Business Hours: Allow access only during working hours
- Maintenance Windows: Block access during maintenance
- Time Zone Support: Configuration for multiple time zones
IP-Based Controls
Managing access based on source IP addresses.
- IP Whitelisting: Allow specific IP ranges
- IP Blacklisting: Block known malicious IPs
- Dynamic Lists: Threat intelligence integration
User Blocking
Blocking specific users or groups from authentication.
- Manual Blocking: Administrator-initiated user suspension
- Automatic Blocking: Failed login thresholds
- Temporary Locks: Time-limited blocks
CAPTCHA Protection
CAPTCHA challenges to prevent automated attacks.
- Failed Login Trigger: Show CAPTCHA after X failed attempts
- Bot Detection: Prevent brute-force attacks
- reCAPTCHA Integration: Support for Google reCAPTCHA
Policy Enforcement Levels
Access control policies can be applied at multiple levels:
- Global Level: All applications and users
- Application Level: Specific RADIUS clients or SSO applications
- Group Level: Specific user groups
- User Level: Individual users
Policy Combinations
Multiple policies can be combined for comprehensive security:
Example: Secure VPN Access
├── GeoIP: Allow only from Turkey
├── Time: Business hours (Mon-Fri 08:00-18:00)
├── IP Whitelist: Corporate IP ranges
└── CAPTCHA: After 3 failed attempts
Best Practices
- Start Permissive: Begin with looser policies and gradually tighten them
- Comprehensive Testing: Verify that policies do not block legitimate users
- Monitor Logs: Regularly review access denials
- Layered Policies: Use multiple policy types for defense-in-depth
- Whitelist Critical Users: Ensure administrators can always access
Important
Access control policies are evaluated BEFORE authentication factors. Blocked users will not be prompted for MFA.
Test
Use the "Policy Simulation" feature to test policies before applying them to production.