{"id":5565,"date":"2022-12-09T03:52:00","date_gmt":"2022-12-09T03:52:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=5565"},"modified":"2026-01-25T07:49:44","modified_gmt":"2026-01-25T07:49:44","slug":"endpoint-mfa-sso","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso","title":{"rendered":"Endpoint MFA\/SSO"},"content":{"rendered":"\n<p>Multi-Factor Authentication (MFA), once an \u2018extra step\u2019 only enforced by the most stringent companies, is quickly becoming a must-have.<\/p>\n\n\n\n<p>As cyberthreats increase and advance, so do compliance and security requirements specified by governing bodies. Most organizations now have policies around MFA and Single Sign-On (SSO) in place, both to protect their IT environment and to ensure adherence to various compliance regulations.<\/p>\n\n\n\n<p>Such policies or business rules can prove cumbersome for all involved: enforcing that they\u2019re followed may present a problem for IT Admins, whereas abiding by them may seem annoying and unnecessary to the end user (who just got sent their 4th verification code of the day\u2026)<\/p>\n\n\n\n<p>So, we decided to build endpoint MFA and SSO capabilities into version 8.0 of our existing Privileged Access Management (PAM) solution, allowing customers to configure and enforce business rules around these two security features from within their User Portal.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A New Elevation Method<\/h2>\n\n\n\n<p>In the current feature set (i.e., prior to v8.0), you can configure either Confirm or Authenticate in your User Portal as the approval method users run through when requesting privileged elevation.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Confirm:<\/strong>&nbsp;a pop-up appears with a simple option to Confirm that they are about to elevate an app or start an elevated session.<\/li>\n\n\n\n<li><strong>Authenticate:<\/strong>&nbsp;A pop up appears which requires the user to enter their details and (if configured) a reason for the requested elevation.<\/li>\n<\/ul>\n\n\n\n<p><strong>Single Sign-On<\/strong>&nbsp;is now the third option available, which directs users to the configured SSO provider and requires MFA when they request elevation. Admin By Request then verifies that SSO is complete according to the company\u2019s business rules, and the requested elevation is granted.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Benefits<\/h2>\n\n\n\n<p>The feature is ideal for enabling organizations to enforce business rules and ensure security and compliance. It enforces MFA on the endpoint prior to elevation \u2013 a requirement for UK organizations who must adhere to the UK Cyber Essentials framework.<\/p>\n\n\n\n<p>On the end user side, this feature vastly reduces the number of steps the user needs to take by essentially allowing them to bypass Windows Authenticate and use SSO in order to obtain elevated privileges; the same end result, with fewer clicks. Users no longer have to wait for approval (as is the case in Authenticate \/ Require Approval mode) &#8211; as soon as SSO is complete, approval is granted.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Configuring the Feature<\/h2>\n\n\n\n<p>1. In the User Portal, navigate to&nbsp;<em>Logins &gt; Single Sign-On Setup<\/em>, and select&nbsp;<strong>Endpoint Single Sign-On<\/strong>&nbsp;from the drop-down menu:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Content\/0.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>2. In the User Portal, navigate to&nbsp;<em>Settings &gt; OS Settings &gt; Endpoint &gt; UAC<\/em>, and select&nbsp;<strong>Single Sign-On<\/strong>&nbsp;as the UAC mode:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Content\/1(6).png\" alt=\"\"\/><\/figure>\n\n\n\n<p>3. In the&nbsp;<em>Single Sign-On Configuration<\/em>&nbsp;section, select the preferred SSO provider from the drop-down menu:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Content\/2(3).png\" alt=\"\"\/><\/figure>\n\n\n\n<p>Note you may want to enable&nbsp;<strong>Email match<\/strong>, which requires the person validating with SSO to be the same as the user logged in to the endpoint. This may seem like a given, but in some situations, customers have one email address in Azure, and use a different one for SSO.<\/p>\n\n\n\n<p>5.&nbsp;<strong>Save<\/strong>&nbsp;your settings. Now when users request elevation, a window will appear requiring they sign in to the configured IdP provider according to your User Portal settings:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Content\/OfficeOkta-01.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>6. Entries in the Auditlog indicate which users have elevated using SSO with an orange&nbsp;<strong>SSO \u2714\ufe0f<\/strong>&nbsp;badge:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Content\/5(3).png\" alt=\"\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Sub-Settings<\/h2>\n\n\n\n<p>This feature can be fully tailored to suit large enterprises who may use several different IdPs depending on region.<\/p>\n\n\n\n<p>Global settings allow you to choose the global IdP which will be used for SSO across the board, however in Sub-Settings, you can override the global settings for different users or groups, and configure these users or groups to each use a different SSO solution for verification.<\/p>\n\n\n\n<p>A use case for Sub-Settings is as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A global organization has one factory in Indonesia and six factories across Australia<\/li>\n\n\n\n<li>At all of the Australian sites, Okta is the IdP solution used<\/li>\n\n\n\n<li>At the Indonesian location, Office 365 is used<\/li>\n\n\n\n<li>The organization creates a Global Setting which configures Okta as the SSO solution, because this is the predominant IdP used at the company and therefore applies to most users<\/li>\n\n\n\n<li>In order to allow MFA\/SSO for the Indonesian location, the organization creates a Sub-Setting for users in this scope, which overrides the Global Settings and instead configures Office 365 as the IdP for SSO.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Support Assist<\/h2>\n\n\n\n<p>SSO works in conjunction with our existing Support Assist feature: Help Desk personnel are able to provide Support Assistance via SSO without ever logging in to the endpoint.<\/p>\n\n\n\n<p>The Support Assist feature allows SSO sign-ins that have been configured in Sub-Settings &#8211;&nbsp;<em>without<\/em>&nbsp;requiring an Active Directory\/Azure Active Directory (AD\/AAD) account.<\/p>\n\n\n\n<p>For example, if you have configured an SSO Sub-Setting with Okta as the configured IdP, a Help Desk member with an Okta identity (but&nbsp;<em>not&nbsp;<\/em>an AD\/AAD identity) is able to start a Support Assist session by authenticating to the Sub-Settings SSO provider (in this case, Okta). The \u2018virtual\u2019 user is monitored during the session, but never actually logs on to the machine.<\/p>\n\n\n\n<p>This allows organizations to enforce policies (e.g., \u201clog on locally\u201d restricted to one user) while still utilizing the Support Assist feature.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>The latest SSO\/MFA feature coming with Admin By Request v8.0 is simple, but effective: it gives enterprises the power to enforce business rules and ensure full compliance and maximum security within the organization, while reducing wait times and increasing productivity for end users.<\/p>\n\n\n\n<p>Get endpoint MFA\/SSO as part of your existing Privileged Access Management solution: keep an eye out for Admin By Request version 8.0 \u2013 released Monday 12th December.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Multi-Factor Authentication on the endpoint is quickly becoming a must-have for enterprises who value security and have compliance regulations to adhere to. So far MFA has been largely unavailable as a feature of existing PAM solutions &#8211; that&#8217;s about to change with Admin By request version 8.0.<\/p>\n","protected":false},"author":2,"featured_media":7722,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[57,58,59,60,53,55,18,56,54],"ppma_author":[9],"class_list":["post-5565","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-credentials","tag-endpoint","tag-endpoint-mfa","tag-endpoint-sso","tag-mfa","tag-multi-factor-authentication","tag-privileges","tag-single-sign-on","tag-sso","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.1 - aioseo.com -->\n\t<meta name=\"description\" content=\"Multi-Factor Authentication on the endpoint is quickly becoming a must-have for enterprises who value security and have compliance regulations to adhere to. So far MFA has been largely unavailable as a feature of existing PAM solutions - that&#039;s about to change with Admin By request version 8.0.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"credentials,endpoint,endpoint mfa,endpoint sso,mfa,multi-factor authentication,privileges,single sign-on,sso\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.1\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Endpoint MFA\/SSO \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Multi-Factor Authentication on the endpoint is quickly becoming a must-have for enterprises who value security and have compliance regulations to adhere to. So far MFA has been largely unavailable as a feature of existing PAM solutions - that&#039;s about to change with Admin By request version 8.0.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-12-09T03:52:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:49:44+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Endpoint MFA\/SSO \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Multi-Factor Authentication on the endpoint is quickly becoming a must-have for enterprises who value security and have compliance regulations to adhere to. So far MFA has been largely unavailable as a feature of existing PAM solutions - that&#039;s about to change with Admin By request version 8.0.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso#blogposting\",\"name\":\"Endpoint MFA\\\/SSO \\u00bb Admin By Request\",\"headline\":\"Endpoint MFA\\\/SSO\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Finger-AI.png\",\"width\":2000,\"height\":1050,\"caption\":\"Digital artwork of an AI finger.\"},\"datePublished\":\"2022-12-09T03:52:00+00:00\",\"dateModified\":\"2026-01-25T07:49:44+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso#webpage\"},\"articleSection\":\"Blogs, Credentials, Endpoint, Endpoint MFA, Endpoint SSO, MFA, Multi-Factor Authentication, privileges, Single Sign-On, SSO, S Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso#listItem\",\"name\":\"Endpoint MFA\\\/SSO\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso#listItem\",\"position\":3,\"name\":\"Endpoint MFA\\\/SSO\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso\",\"name\":\"Endpoint MFA\\\/SSO \\u00bb Admin By Request\",\"description\":\"Multi-Factor Authentication on the endpoint is quickly becoming a must-have for enterprises who value security and have compliance regulations to adhere to. So far MFA has been largely unavailable as a feature of existing PAM solutions - that's about to change with Admin By request version 8.0.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Finger-AI.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso\\\/#mainImage\",\"width\":2000,\"height\":1050,\"caption\":\"Digital artwork of an AI finger.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/endpoint-mfa-sso#mainImage\"},\"datePublished\":\"2022-12-09T03:52:00+00:00\",\"dateModified\":\"2026-01-25T07:49:44+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Endpoint MFA\/SSO \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Endpoint MFA\/SSO \u00bb Admin By Request","description":"Multi-Factor Authentication on the endpoint is quickly becoming a must-have for enterprises who value security and have compliance regulations to adhere to. So far MFA has been largely unavailable as a feature of existing PAM solutions - that's about to change with Admin By request version 8.0.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"credentials,endpoint,endpoint mfa,endpoint sso,mfa,multi-factor authentication,privileges,single sign-on,sso","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso#blogposting","name":"Endpoint MFA\/SSO \u00bb Admin By Request","headline":"Endpoint MFA\/SSO","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/12\/Finger-AI.png","width":2000,"height":1050,"caption":"Digital artwork of an AI finger."},"datePublished":"2022-12-09T03:52:00+00:00","dateModified":"2026-01-25T07:49:44+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso#webpage"},"articleSection":"Blogs, Credentials, Endpoint, Endpoint MFA, Endpoint SSO, MFA, Multi-Factor Authentication, privileges, Single Sign-On, SSO, S Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso#listItem","name":"Endpoint MFA\/SSO"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso#listItem","position":3,"name":"Endpoint MFA\/SSO","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso","name":"Endpoint MFA\/SSO \u00bb Admin By Request","description":"Multi-Factor Authentication on the endpoint is quickly becoming a must-have for enterprises who value security and have compliance regulations to adhere to. So far MFA has been largely unavailable as a feature of existing PAM solutions - that's about to change with Admin By request version 8.0.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/12\/Finger-AI.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso\/#mainImage","width":2000,"height":1050,"caption":"Digital artwork of an AI finger."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso#mainImage"},"datePublished":"2022-12-09T03:52:00+00:00","dateModified":"2026-01-25T07:49:44+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Endpoint MFA\/SSO \u00bb Admin By Request","og:description":"Multi-Factor Authentication on the endpoint is quickly becoming a must-have for enterprises who value security and have compliance regulations to adhere to. So far MFA has been largely unavailable as a feature of existing PAM solutions - that's about to change with Admin By request version 8.0.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2022-12-09T03:52:00+00:00","article:modified_time":"2026-01-25T07:49:44+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Endpoint MFA\/SSO \u00bb Admin By Request","twitter:description":"Multi-Factor Authentication on the endpoint is quickly becoming a must-have for enterprises who value security and have compliance regulations to adhere to. So far MFA has been largely unavailable as a feature of existing PAM solutions - that's about to change with Admin By request version 8.0.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"5565","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":null,"og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":null,"robots_max_videopreview":null,"robots_max_imagepreview":"large","priority":null,"frequency":null,"local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:16:28","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2023-05-22 22:01:14","updated":"2026-01-25 08:16:28"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tEndpoint MFA\/SSO\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Endpoint MFA\/SSO","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/endpoint-mfa-sso"}],"authors":[{"term_id":9,"user_id":2,"is_guest":0,"slug":"sophie-admin","display_name":"S Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"S","job_title":"","description":"With a solid background in computer science and graphic design, my career kicked off writing tech manuals for various companies in both the software and hardware realms. I then side-stepped into marketing and found my passion in cybersecurity.\r\n\r\nI fuse my tech know-how with design skills to craft engaging blogs that spotlight cybersecurity for businesses. My main focus now is championing the marketing efforts of Admin By Request Zero Trust Platform, where my creative take on cybersecurity helps me create content that's enlightening, entertaining, and impactful.\r\n\r\nMy articles have graced the pages of InfoSec Magazine and top-tier security websites like OPSWAT. I'm on a mission to stress the significance of cybersecurity and to showcase how Admin By Request is shaking things up by making enterprise solutions simple, intuitive, accessible, and affordable to organizations of all sizes, in any industry.\r\n\r\nMy goal is to craft content that informs, intrigues, and motivates action, helping businesses understand the pivotal role of cybersecurity in the digital age we're now living in. Through my work, I aim to close the gap between technology and its real-world applications, keeping our audience well-informed, interested, and ready for the ever-evolving cybersecurity landscape.\r\n\r\nI bring a blend of extensive experience, deep expertise, recognized authority, and unwavering commitment to trustworthiness in cybersecurity. My goal? To make complex topics relatable and actionable for businesses of all sizes - just like Admin By Request strives to do."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/5565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=5565"}],"version-history":[{"count":1,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/5565\/revisions"}],"predecessor-version":[{"id":5566,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/5565\/revisions\/5566"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/7722"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=5565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=5565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=5565"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=5565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}