Ukraine flag

We stand with our friends and colleagues in Ukraine. To support Ukraine in their time of need visit this page

> Outlook Web App (OWA) 2FA

Outlook Web App (OWA) 2FA

This guide shows how you can set up Outlook Web App two-factor authentication (OWA 2FA) using the Protectimus Cloud MFA service or Protectimus On-Premise MFA Platform.

Adding multi-factor authentication to the Outlook Web App protects users’ accounts from unauthorized access and such hacking attacks as brute force, data spoofing, phishing, social engineering, keyloggers, etc.

ATTENTION! .NET Framework 4.7.x is required.

1. Get Registered and Configure Basic Settings

  1. Register with the Protectimus Cloud Service and activate API or install the Protectimus On-Premise Platform.
  2. Add Resource.
  3. Add Users.
  4. Add Tokens or activate Users’ Self Service Portal.
  5. Assign Tokens to Users.
  6. Assign Tokens with Users to the Resource.

2. Install the Protectimus OWA 2FA Сomponent

  1. Download the Protectimus OWA 2FA installer here.
  2. Run the installer as administrator.
  Protectimus OWA 2-factor authentication component installation - run the intaller as administrator  
  1. You will see a welcome screen, click Next to continue.
  OWA two-factor authenication setup with Protectimus - step 1  
  1. Read and accept the terms in the license agreement and click Next to continue the installation.
  OWA 2-factor authenication setup with Protectimus - step 2  
  1. Enter API URL, Login, and API Key and click LogIn.

    These parameters stand for:
    • API URL – an address of the API endpoint. If you use SAAS Service API URL is https://api.protectimus.com/. In the case of the on-premise Platform, API URL is a server address, where the Platform is running (for example, https://localhost:8443).
    • Login – the login of your account, the same as for signing in.
    • API Key – you’ll find it in your profile. To access a profile, click the user’s login in the top right corner of the interface, and choose the “Profile” entry from the drop-down list.
  OWA MFA setup with Protectimus - step 3  
  1. Resource ID. Choose the Resource you’ve created before the installation. After that click Next to continue.
If you haven’t added the resource yet, add it now. Click Add Resource and enter any Resource Name you wish.
  OWA 2FA setup with Protectimus - step 4  
  1. Set additional settings:
    • Invalid OTP Message – specify the message text for invalid OTP.
    • General API Error Message – specify the API error message text.
    • AD Group – if you want to add two-factor authentication only for a specific AD group, select that AD group. By default, two-factor authentication will be enabled for all users.
    • Cache Timeout – specify how often Protectimus will contact Active Directory to check if the user requesting OWA access is added to AD. Time must be indicated in minutes. By default, the value is set to 15 minutes, which means that Protectimus will synchronize with Active Directory once every 15 minutes. If you specify a value of 0, the system will contact Active Directory every time a user logs in.
    • OTP Cookie Lifetime – specify how often the end users will be asked to re-authenticate. Time must be indicated in minutes. By default, the value is set to 720 minutes (12 hours), which means that every 12 hours your users will be asked to enter their one-time passwords to continue working with OWA.

PLEASE NOTE! You can also change these settings in the configuration file later.

Outlook Web App two-factor authentication setup with Protectimus - step 5  
  1. Click Next to continue.
  Outlook Web App multi-factor authentication setup with Protectimus - step 6    
  1. Everything is ready for installation. Check the boxes for the modules you want to protect – OWA, Exchange Admin Center, or both of them. Then click Install.
  Outlook Web App 2FA setup with Protectimus - step 7  

3. Log in to Outlook Web App or EAC with Protectimus 2FA

  1. Open your Outlook Web App or Exchange Admin Center.
  2. Enter your Username and Passcode, and then click Login.
  Log in to Outlook Web App with Protectimus 2FA - step 1  
  1. Enter the one-time password from the two-factor authentication token.
  Log in to Outlook Web App with Protectimus MFA - step 2  
PLEASE NOTE! If you use an OCRA token, use the challenge you will see on the authentication page to generate a one-time password.
  Log in to Outlook Web App with Protectimus MFA with OCRA token  

4. How to Change Settings

You can change any settings, including API URL, API key, Resource ID, Group settings and other optional settings, in the configuration file.

Outlook Web App MFA setup with Protectimus - configuration file
Integration of Outlook Web App with Protectimus 2FA solution is now complete. If you have other questions, contact our customer support service.

5. Username Format Configuration

The user login in the Protectimus service should be in the format of user@domain or DOMAIN\user, where user is the username in AD, and domain is your corporate domain.
To transmit the user login in the desired format to the API, you can use the following parameter in the configuration file:

<add key="protectimus:is-owa-old-format" value="true" />

The protectimus:is-owa-old-format parameter can have two values: true or false.
PARAMETER VALUE FUNCTION
true
When the user enters the login in the format DOMAIN\user (netBiosName), the login is converted to the user@domain format (UserPrincipalName).
false
When the user enters the login in the format user@domain, the login is converted to the DOMAIN\user format.
If the parameter is not set
The user’s login, entered during login, is transmitted to the API in its original format.

Additionally, the user can enter the login in the format user@domain if the value is set to true, or DOMAIN\user if the value is set to false. In this case, no conversion will be performed as the login is already in the “correct” format.
Last updated on 2023-06-14