Skip to main content

Enabling MFA Enforcement in Google Workspace

backBack

Enabling MFA Enforcement in Google Workspace

RemediationsDuration5 mins

To allow Rotate to perform one-click MFA enforcement in your Google Workspace tenant, a one-time manual setup is required by an administrator. This enables Rotate to enforce MFA safely and securely without risking user lockout.


πŸ›‘οΈ How MFA Enforcement Works in Rotate​

When using Rotate's one-click MFA enforcement:

  • If the user has MFA disabled, Rotate will not enforce MFA, to avoid locking the user out.
  • If the user has MFA enabled, Rotate will:
    1. Add the user to a special group: Mfa Enforced Group.
    2. This group must have a Google policy that enforces 2-step verification.
    3. MFA enforcement takes effect based on this group's policy.

⚠️ Important: Google does not allow this group-based MFA policy to be configured via API. You must manually configure it once as an admin.


βœ… One-Time Setup Instructions (Admin Only)​

To enable Rotate's enforcement to work, follow these steps:

  1. Log in to your Google Admin console.

  2. In the left sidebar, go to:

    Security β†’ Authentication β†’ 2-step verification

    image.png

  3. Locate the group called mfa_enforced_group@yourdomain.com.

  4. Under the Enforcement section:

    • Choose "On" to enforce MFA immediately.

      OR

    • Choose "On from" to set a future enforcement date.

    image.png

  5. (Optional) Adjust other settings:

    • New user enrollment period: Set grace time before enforcement applies.
    • Frequency: Choose if users can "trust" devices.
    • Methods: Keep as "Any" unless you want to restrict options.

πŸ” Recap of User MFA States​

User StatusRotate Behavior
MFA not enabled, not enforced🚫 Do not enforce (to avoid lockout)
MFA not enabled, enforcement activeπŸ”’ User may be locked out
MFA enabled, not enforcedβœ… Safe to enforce via group
MFA enabled, enforcedπŸ”’ Already protected

πŸ“Œ Notes​

  • The group Mfa Enforced Group is automatically created by Rotate.
  • Enforcement settings must be applied once manually.
  • This setup allows Rotate to maintain security without interrupting user access.
  • Rotate adds the users with enabled MFA to the group anyway, but the enforcement will take place only after you configure the group as described.

Let us know if you need help configuring your workspace β€” our support team is ready to assist.

Frequently Asked Questions

Sign-ins
What is an "Impossible Travel" sign-in event?

This occurs when a user logs in from two distant locations within a time period that would be physically impossible. For example:

  • 8:00 AM: Sign-in from New York.
  • 8:15 AM: Sign-in from London. This indicates possible account compromise or session hijacking.

Why is sign-in monitoring important for security?

Sign-in logs help detect unauthorized access attempts, brute-force attacks, and compromised accounts. Reviewing sign-ins can reveal impossible travel scenarios, MFA bypass attempts, or login anomalies that indicate potential breaches.

How can creating policies help enhance security?

Creating policies allows you to:

  • Proactively Manage Threats: Implement rules that automatically respond to unusual or unauthorized activities, helping to mitigate potential risks before they escalate.
  • Customize Security Measures: Tailor security settings to fit the unique needs of your organization, ensuring that protective measures align with your specific security goals.
  • Ensure Compliance: Maintain compliance with regulatory requirements by enforcing consistent policies that govern data access and user behavior.
Remediations
How to enforce MFA on a user

How to enforce MFA on a user

To enforce Multi-Factor Authentication (MFA) on a user in our platform, follow these steps:

  1. Go to Identity Hub.
  2. Click on the selected user.
  3. Navigate to the Remediations tab.
  4. Scroll to the Enforce MFA section.
  5. Select the application where you wish to enforce MFA for the user.
  6. Click Enforce.

MFA will then be enforced for the user on the selected application.

How to reset a user password

How to reset a user password

To reset a user’s password on our platform, follow these steps:

  1. Go to Identity Hub.
  2. Click on the selected user.
  3. Navigate to the Remediations tab.
  4. Scroll to the Reset Password section.
  5. Select the integration where you wish to reset the user's password.
  6. Click Reset Password.
  7. Follow any additional instructions if prompted.

The user’s password will then be reset according to the selected integration’s requirements.

How to Suspend a User

How to suspend a user

To suspend a user on our platform, follow these steps:

  1. Go to Identity Hub.
  2. Click on the selected user.
  3. Navigate to the Remediations tab.
  4. Scroll to the Suspend Account section.
  5. Select the integrations from which you'd like to suspend the user.
  6. Click Suspend.

The user will then be suspended from the chosen integrations.

General
How Rotate Enhances Identity Security

Rotate's Identity Hub offers a comprehensive suite of features designed to strengthen your organization's identity security:

  • User and Device Management: Gain visibility into user details, monitor actions, and manage connected devices and applications.
  • Security Enforcement: Enforce Multi-Factor Authentication (MFA) and strong password policies, and enroll employees in security awareness training programs.
  • Remediation Actions: Quickly respond to threats by suspending accounts, resetting passwords, disconnecting users from all apps and devices, and enforcing MFA.
  • Access Monitoring and Anomaly Detection: Track login behaviors with geo-location heatmaps and AI-driven insights to detect risky activities and anomalies, such as impossible travel or suspicious login times and locations.
  • Policy Management: Create and enforce security policies with specific actions like alerts or restrictions to address potential threats.

By integrating these capabilities, Rotate's Identity Hub provides a robust framework to protect your organization against identity-related threats.

On this page