Joget DX 8 Stable Released
The stable release for Joget DX 8 is now available, with a focus on UX and Governance.
OTP Email MFA is a Multi-factor authentication plugin that sends a one-time password to a user's email providing an additional layer of security.
Multi-Factor Authentication (MFA) is a security best practice that adds an extra layer of protection on top of a username and password combination. By requiring an additional authentication code from a trusted device, MFA safeguards access to a user’s account even if the password is compromised.
1. Go to the website https://github.com/jogetoss/otp-email-mfa.
2. Go to the "Releases" page (See Figure 1).
Figure 1
3. Click on the .jar file to initiate the download (See Figure 2).
Figure 2
4. Go to your Joget Workflow localhost or server and log in as admin.
5. In Joget Console navigate to "Admin Bar > Systems Settings > Manage Plugins" and click the "Upload Plugins" button.
6. In "Upload Plugin", select the plugin .jar file you just downloaded, then click "Upload".
7. You should be able to view the newly installed plugin under the "Installed Plugins" tab.
8. Remember to always uninstall the old plugin before uploading a new version.
9. The Joget Workflow Knowledge Base has more information on managing and developing plugins.
1. Start the Joget server and open the App Center.
2. Log in as admin, click on Settings in the admin bar, and navigate to Directory Manager Settings. (See Figure 3)
Figure 3
3. Choose the Security Enhanced Directory Manager in the Select Plugin field and select OTP Email MFA Authenticator for the Multi-Factor Authenticator property and configure accordingly. (See figure 4)
Figure 4
4. Configure all the plugin configurations accordingly.(See figure 5,6&7)
Figure 5: Configure OTP Password Email MFA Authenticator
Name | Description |
---|---|
Validity Period (minute) | Expiration time for the One Time Password (OTP) sent to the user's email registered in the profile to remain valid in minutes. The default value is 5 minutes. |
Subject | The subject of the email with the OTP. |
Message | The message to be displayed in the email. |
Figure 6 : Default Directory Password Policy
Figure 7 Notification
Name | Description |
---|---|
Host | Key in your mail server address, either via domain name or IP address. |
Port | Key in your mail server port number. |
Security | Key in either TLS or SSL depending on your mail server. |
Username | Key in the sender email username. |
Password | Key in the sender email password |
From Email Address | Key in the sender email address to be shown to the recipient. |
5. Before submitting the OTP Email MFA Authenticator, you may Send Test Email to verify your Email configuration.(See figure 8).
You can also refer the SMTP settings from here :General Settings#SMTPSettings. The SMTP settings in General settings will enable Joget DX to use these SMTP values as global default values for all your apps.
Figure 8 : Send Test Email
6. Once all configurations have been inspected and tested, you may submit the OTP Email MFA Authenticator to Enable it. Once enabled, users will be able to enable MFA individually in their User profile.
7. Optionally, you may also activate all user to use OTP Email MFA Authenticator by default by adding their username as entries into the dir_user_meta table.
Here's an sql query where you can do so :
insert into dir_user_meta (username, meta_key, meta_value) select username,'OTP_EMAIL','enabled' from dir_user t1 where not exists( select id from dir_user_meta t2 where t2.username = t1.id );
This query will add all the existing users in the dir_user table into dir_user_meta table with the following values :
username : <username>
meta_key : OTP_EMAIL
meta_value : enabled
The "where not exists" clause is to check and skip for existing users already having otp enabled.
Joget authentication will automatically check if the user exists in this table and prompt them with the "please enter OTP" message.
1. Users can activate OTP Email MFA Authenticator in their respective user profiles by clicking the "Activate" button. (See Figure 9)
Figure 9
2. Before activating OTP Email MFA Authenticator, users should make sure that a valid and working email has been registered in their profile under the User Details section as the email containing the OTP will be sent to this registered email.
3. A popup dialog will appear showing a Password field to submit the email OTP sent to the user. If the code is valid, OTP Email MFA will be activated (See Figure 10).
Figure 10
4. The users should always remember to save their user profile after activating MFA.
5. On subsequent logins, the users will be prompted for an OTP password which will always be sent to the user's email.
1. As a user, you can disable OTP Email MFA Authenticator by clicking on the Deactivate button in your user profile. (See Figure 11)
Figure 11
2. Administrators can also disable MFA for a specific user by selecting the Setup Users under Users in the admin bar and clicking on the Deactivate MFA button. (See Figure 12)
Figure 12