RAS Management Portal
ProductsSupportPartnersDocumentation
English
English
  • Introduction
    • Parallels RAS 19 release history
    • Overview
    • What's new
  • Installation and Configuration
    • Prerequisites
    • Installation
  • Get Started with RAS Management Portal
    • Log in to RAS Management Portal
    • Configure RAS Web Administration Service
    • RAS Management Portal user interface
  • Site Category
  • Farm Settings
    • Administrators
    • Mailbox
    • Licensing
  • Site Settings
    • Connection and authentication
    • Multi-factor authentication
      • Using RADIUS
      • Using Google Authenticator
      • Configuring MFA rules
    • FSLogix Profile Container
      • Configure managing existing profiles by Parallels RAS
      • Configure Site defaults and hosts for FSLogix
    • Universal Printing
    • Universal Scanning
  • Infrastructure
    • RD Session Hosts
      • Add an RD Session Host
      • Configure an RD Session Host
        • Using Site or host pool defaults
        • General
        • Agent Settings
        • User Profile
        • Desktop Access
        • Printing and Scanning
      • Manage an RD Session Host
        • Overview
        • Active Sessions
        • Running Resources
        • Running Processes
        • Troubleshooting
      • RDSH groups
    • Virtual Desktops Infrastructure
    • Certificates
      • Generate a self-signed certificate
      • Generate a certificate signing request (CSR)
      • Let's Encrypt certificates
        • Working with Let's Encrypt certificates
        • How Parallels RAS requests certificates from Let's Encrypt
      • Import a certificate from a file
      • Export a certificate to a file
      • Assign a certificate to Gateways and HALB
    • Gateways
      • Add a Gateway
      • Configure a Gateway
        • General
        • Mode
        • Network
        • SSL/TLS
          • Client and Server configurations
        • User Portal
          • Web
        • Wyse
        • Security
      • Managing Gateways
    • Connection Brokers
      • Configure RAS Connection Broker
      • Add a secondary Connection Broker
      • Manage RAS Connection Brokers
    • Providers
    • Site defaults
  • Sessions
    • Overview
    • Session information
    • User sessions
    • Running resources
  • Publishing
    • Publish an application
    • Publish a desktop
    • Publish a document
    • Publish a folder on the file system
    • Manage published resources
      • Manage published applications
      • Manage published desktops
      • Manage folders
      • Site defaults (Publishing)
      • Using filtering rules
      • Configuring preferred routing
  • Monitoring
    • Overview
    • Install RAS Performance Monitor
    • Enable monitoring in RAS Management Portal
    • Viewing performance metrics
    • Configure RAS Performance Monitor Security
  • Updating RAS Agents
  • Help and Support
  • Appendix
    • Microsoft license requirements in Parallels RAS
    • Port reference
      • Parallels Client
      • Web browsers
      • HALB
      • RAS Secure Gateway
      • RAS Connection Broker
      • RAS Console
      • SSRS
      • RAS Reporting
      • RAS Web Administration Service (REST/Management Portal)
      • RAS PowerShell
      • RAS Provider Agent
      • RAS Enrollment Server
      • RAS RD Session Host Agent
      • RAS Guest Agent
      • RAS Remote PC Agent
      • Tenant Broker
      • Active Directory and Domain Services ports
      • Azure Virtual Desktop
    • RAS performance counters
Powered by GitBook

Social media

  • Facebook
  • Twitter
  • LinkedIn
  • YouTube

Other Resources

  • Feedback

© 2025 Parallels International GmbH. All rights reserved.

On this page

Was this helpful?

Export as PDF
  1. Site Settings
  2. Multi-factor authentication

Configuring MFA rules

Multi-factor authentication (MFA) can be enabled or disabled for all user connections, but you can configure more complex rules for specific connections. This functionality allows you to create enable or disable MFA for the same user or computer, which will be applied depending on where the user is connecting from and from which device. Each MFA provider has one rule that consists of one or several criteria for matching against user connections. In turn, each criteria consists of one or several specific objects that can be matched.

You can match the following objects:

  • User, a group the user belongs to, or the computer the user connects from.

  • Secure Gateway the user connects to.

  • Client device name.

  • Client device operating system.

  • IP address.

  • Hardware ID. The format of a hardware ID depends on the operating system of the client.

Notice the following about the rules:

  • Criteria are connected by the AND operator. For example, if a rule has a criteria that matches certain IP addresses and a criteria that matches client device operating systems, the rule will be applied when a user connection matches one of the IP addresses AND one of the client operating systems.

  • Objects are connected by the OR operator. For example, if you only create a criteria for matching client device operating systems, the rule will be applied if one of the operating systems matches the client connection.

To configure a rule:

  1. Navigate to Site Settings > Connection > Multi-factor authentication.

  2. Double-click the name of the Google Authenticator provider that you want to configure.

  3. Click the Restrictions link.

  4. Click the Edit button.

  5. Clear the Inherit Defaults option.

  6. Specify criteria for the rule. You will find the following controls:

    • Allow: specifies that the MFA provider must be enabled when a user connection matches the criteria. Click Allow to change it to Deny.

    • Deny: specifies that the policy the MFA provider must not be enabled when a user connection matches the criteria. Click Deny to change it to Allow.

    • (+): adds a new criteria. If you want to match a Secure Gateway, a client device name, a client device operating system, an IP address, or a hardware ID, click (+).

    • is: specifies that the MFA provider must be enabled (or not not enabled, per Allow and Deny) when a user connection matches the criteria. Click is to change it to is not. This control appears when at least one object is added.

    • is not: specifies that the MFA provider must be enabled (or not not enabled, per Allow and Deny) when a user connection does not match the criteria. Click is not to change it to is. This control appears when at least one object is added.

    You can also disable and enable criteria by clicking on the switch to the left of it.

  7. Click Save when done.

PreviousUsing Google AuthenticatorNextFSLogix Profile Container

Last updated 1 year ago

Was this helpful?