Enforcing MFA for end users
Enforcing MFA for an end-user on a sub-organization can do so using a delegated access user. A delegated access user is a non-root user created in the sub-organization whose API key is controlled by the parent organization and has carefully scoped permissions to perform only specific actions. To set this up:- The sub-organization’s root user creates a delegated access user with an API key controlled by the parent org.
- The sub-organization’s root user creates a policy that allows the delegated access user to manage MFA policies.
- The delegated access user can then create MFA policies for the sub-organization’s root user.
MFA recovery
If an end user loses access to one of their authentication methods, they may be locked out of activities that require MFA. Because Turnkey cannot write to organizations directly, Turnkey is unable to recover users on their behalf. You must set up a recovery mechanism in advance. The recommended approach is to use delegated access users to delete the MFA policy that is locking the user out. The delegated access user’s policy should be scoped to allow deletion of MFA policies:Quorum-based recovery
It is strongly recommended that you set up two or more delegated access users for MFA recovery, with a consensus policy requiring both to approve before an MFA policy can be deleted. This prevents any single party from removing a user’s MFA protections. To set this up:- Create two delegated access users in the sub-organization, each with an API key controlled by different parties in the parent organization.
- Create a policy scoped to MFA policy deletion with a consensus requirement:
DeleteMfaPolicy activity.