Chapter 6: Authentication — MFA, SSO & Active Directory

Learning Objectives

Pre-Quiz — Test Your Current Knowledge

1. Which MFA method does Cohesity recommend as the primary authentication factor?

Email verification codes
SMS text messages
Authenticator app (TOTP)
Hardware security keys

2. What SSO protocol does Cohesity support for web UI login?

OAuth 2.0 only
SAML 2.0
OIDC only
Kerberos tokens

3. What is the maximum allowed clock skew between Active Directory and a Cohesity cluster for Kerberos authentication?

1 minute
10 minutes
5 minutes
15 minutes

4. Can MFA be disabled for Active Directory users in Cohesity?

Yes, through the MFA tab in Access Management
Yes, but only by the built-in admin account
No, disabling MFA for AD users is not supported
Yes, if the AD domain policy allows it

5. Which RBAC mapping method uses SAML attributes to automatically assign roles in Cohesity?

Default role assignment
Individual user-based mapping
Group-based mapping
Certificate-based mapping

6.1 Multi-Factor Authentication

Authentication is the gatekeeper of every security architecture. Before a user can protect data, restore backups, or manage policies on a Cohesity cluster, the system must first verify identity through multiple independent factors.

Multi-factor authentication (MFA) requires users to present two or more independent pieces of evidence before gaining access. Even if an attacker steals a password, they cannot authenticate without the additional factor. Cohesity supports MFA natively, requiring no additional hardware or internet connectivity for its primary method.

graph LR User["User"] --> Layer1["Layer 1\nUsername & Password"] Layer1 --> Layer2["Layer 2\nMulti-Factor Authentication\n(TOTP / Email)"] Layer2 --> Layer3["Layer 3\nSSO via Identity Provider\n(SAML / OIDC)"] Layer3 --> Layer4["Layer 4\nDirectory Services\n(Active Directory / LDAP)"] Layer4 --> Cluster["Cohesity\nCluster Access"] style Layer1 fill:#4a90d9,color:#fff style Layer2 fill:#e8a838,color:#fff style Layer3 fill:#7b68ee,color:#fff style Layer4 fill:#2ecc71,color:#fff style Cluster fill:#34495e,color:#fff

MFA Configuration on Cohesity Clusters

Enabling MFA is a straightforward process performed through the management UI:

  1. Navigate to Settings > Access Management and select the MFA tab.
  2. Turn on the MFA toggle.
  3. Select one or both authentication methods (Authenticator App and/or Email).
  4. Click Enable.

After MFA is enabled at the cluster level, individual users complete setup during their next login by scanning a QR code or manually entering a security key into their authenticator app.

Supported MFA Methods

MethodHow It WorksRequirementsRecommended?
Authenticator App (TOTP)User enters a six-digit, time-based one-time password generated by a TOTP appTOTP app installed (Okta Verify, Google Authenticator, Microsoft Authenticator, or Duo Mobile)Yes — primary method
Email VerificationUser enters a code sent to their registered email addressSMTP server configured and active on the cluster; email address configured per userAs backup only

TOTP (Time-based One-Time Password) generates a new numeric code every 30 seconds based on a shared secret and the current time. The code is valid for approximately five minutes on Cohesity. The cluster does not need internet connectivity when using TOTP.

Interactive: TOTP Code Lifecycle
Simulated authenticator code (refreshes every 30 seconds)
------
30s remaining
sequenceDiagram participant U as User participant App as Authenticator App participant C as Cohesity Cluster U->>C: Enter username & password C->>C: Validate credentials C-->>U: Prompt for MFA code U->>App: Open authenticator app App->>App: Generate 6-digit TOTP code (shared secret + current time) App-->>U: Display code (valid 30s) U->>C: Enter TOTP code C->>C: Generate expected TOTP code (same shared secret + current time) C->>C: Compare codes (5-min window) C-->>U: Access granted
Real-World Analogy: TOTP works like a combination lock where the combination changes every 30 seconds. Both you and the lock know the pattern for generating combinations, so even without communicating, you always arrive at the same code at the same time. An attacker who intercepts one code finds it useless seconds later.

Enforcing MFA: All Users vs. Privileged Accounts

MFA Recovery and Emergency Access

When users lose access to their authenticator device, administrators with super administrator or security administrator privileges can reset that user's MFA credentials. The user re-enrolls on next login.

Best practices for recovery planning:

Key Points — Multi-Factor Authentication

6.2 Single Sign-On Configuration

Single sign-on (SSO) allows users to authenticate once with a central identity provider (IdP) and then access multiple applications — including Cohesity — without re-entering credentials. SSO reduces password fatigue, centralizes authentication policy enforcement, and simplifies user provisioning and deprovisioning.

SAML 2.0 Integration

SAML 2.0 (Security Assertion Markup Language) is an XML-based open standard for exchanging authentication and authorization data between an identity provider and a service provider. SAML is Cohesity's primary SSO protocol, supporting both UI and API-based authentication.

sequenceDiagram participant U as User Browser participant C as Cohesity Cluster (Service Provider) participant IdP as Identity Provider (Okta / Azure AD / AD FS) U->>C: Access Cohesity login page C->>C: Detect SSO domain C-->>U: Redirect to IdP with SAML request U->>IdP: Follow redirect IdP->>IdP: Authenticate user (credentials + MFA) IdP-->>U: Return signed SAML assertion U->>C: POST SAML assertion C->>C: Validate signature & extract user attributes C->>C: Map groups to RBAC roles C-->>U: Grant access with assigned role

To configure SAML SSO, navigate to Settings > Access Management > Single Sign-On > Configure SSO and provide:

FieldPurpose
SSO DomainUnique identifier (typically company domain) that routes users to the correct IdP
SSO ProviderSelected provider from the dropdown list
Single Sign-on URLThe authentication endpoint provided by your IdP
Provider Issuer IDThe identity assertion issuer identifier
X.509 CertificatePublic certificate downloaded from the IdP (must be in .pem format)

Cohesity supports signed authentication requests using RSA-SHA256 and SHA256 digest algorithms. SAML assertions can be both signed and encrypted for maximum security.

OIDC Configuration

OpenID Connect (OIDC) is a modern authentication layer built on OAuth 2.0 that uses lightweight JSON Web Tokens (JWTs). However, Cohesity supports OIDC only for API-based authentication, not for UI login. If users need to sign in through the Cohesity web interface, SAML is required.

graph TD SSO["Single Sign-On Protocols"] SSO --> SAML["SAML 2.0"] SSO --> OIDC["OIDC (OpenID Connect)"] SAML --> SAML_UI["Web UI login: Supported"] SAML --> SAML_API["API authentication: Supported"] OIDC --> OIDC_UI["Web UI login: NOT Supported"] OIDC --> OIDC_API["API authentication: Supported"] style SAML fill:#2ecc71,color:#fff style OIDC fill:#e67e22,color:#fff style SAML_UI fill:#27ae60,color:#fff style OIDC_UI fill:#e74c3c,color:#fff style SAML_API fill:#27ae60,color:#fff style OIDC_API fill:#27ae60,color:#fff

IdP Configuration Examples

Cohesity supports 11+ identity providers. The three most common configurations:

Okta (SAML 2.0)

  1. In Okta, create a SAML 2.0 App Integration.
  2. Set the SSO URL to https://<cluster_fqdn>/idps/authenticate.
  3. Map SAML attributes: Email to user.email, Login to user.login.
  4. For group-based RBAC, enter "groups" in the group attribute name field and apply filters (e.g., "Starts with cohesity_").
  5. Retrieve the IdP SSO URL, Issuer, and download the certificate in .pem format.

Microsoft Entra ID (Azure AD) — SAML

  1. Create a Non-gallery Enterprise Application in Azure AD.
  2. Set Entity ID and Reply URL to the Cohesity authentication endpoint.
  3. Add custom claims and group claims (nested groups are not supported; sAMAccountName requires Azure AD Connect Sync 1.2.70.0+).
  4. Download the SAML Signing Certificate in PEM format.

AD FS

  1. Add a Claims-aware Relying Party Trust with the Cohesity authentication URL.
  2. Create three claim rules: LDAP-to-claims mapping, email claim transformation, and a custom group rule.
  3. Export the Token-Signing Certificate as Base-64 encoded X.509 (.pem).
  4. Note: Cohesity does not support Sign Auth Requests for AD FS.

RBAC with SSO

RBAC MethodDescription
Default RoleAll SSO users receive the same pre-selected default role
Individual User-BasedRoles are assigned per user within Cohesity
Group-BasedCohesity reads the "Groups" SAML attribute and matches it to SSO groups; user inherits the group's role

Users must have explicit IdP entries — missing entries result in authentication rejection. Access can be scoped to all clusters or limited to specific ones.

Key Points — Single Sign-On

6.3 Active Directory & LDAP Integration

While SSO handles web-based authentication flows, many organizations need Cohesity to participate directly in their Active Directory (AD) domain — particularly for SMB file services, delegated administration, and environments where AD is the authoritative identity source.

Real-World Analogy: Joining a Cohesity cluster to Active Directory is like adding a new employee to the company directory. Once registered, the cluster can verify anyone's badge (Kerberos ticket) against the central registry, and existing group memberships automatically determine what each person can access.

Prerequisites for Joining AD

RequirementDetails
Network ConnectivityNetwork path from Cohesity cluster to domain controllers
Account PermissionsDomain Administrator privileges (or permissions to join Computer Objects)
Preferred Domain ControllersAt least 1 DC (2 strongly recommended); without preferred DCs, DNS round-robin can cause intermittent failures
DNS ConfigurationA record for each machine account FQDN on the DNS server
Clock SynchronizationKerberos allows no more than 5-minute clock skew

Configuration Steps

  1. Navigate to Settings > Access Management > Active Directory tab.
  2. Enter the AD domain name.
  3. Provide at least one machine account to identify the cluster on the domain.
  4. (Optional) Select a mapped provider (LDAP or NIS) for UID/GID mapping.
  5. (Optional) Specify the organizational unit.
  6. (Optional) Enable trusted domain discovery.
  7. Supply domain join credentials and complete the join process (~5 minutes).
flowchart TD subgraph Prerequisites DNS["DNS A Record\nfor machine account"] NTP["Clock Sync\n(less than 5 min skew)"] DC["Preferred Domain\nControllers (2+)"] Creds["Domain Admin\nCredentials"] end Prerequisites --> Join["Join Cohesity Cluster\nto AD Domain"] Join --> Machine["Machine Account\nCreated in AD"] Machine --> Ready["Cluster Ready for\nAD Authentication"] subgraph Login["AD User Login Flow"] direction LR UserLogin["User selects\nAD domain"] --> Kerberos["Kerberos ticket\nvalidated against DC"] Kerberos --> GroupLookup["Group membership\nresolved"] GroupLookup --> RBAC["RBAC role\nassigned"] end Ready --> Login style Join fill:#3498db,color:#fff style Ready fill:#2ecc71,color:#fff style Machine fill:#9b59b6,color:#fff
Interactive: Kerberos Authentication Handshake
1
User enters AD credentials on Cohesity login page
2
Cluster forwards authentication request to preferred Domain Controller
3
DC validates credentials and issues Kerberos TGT (Ticket Granting Ticket)
4
Cluster requests service ticket using TGT
5
DC resolves group memberships for the user
6
Cohesity maps AD groups to RBAC roles and grants access

LDAP Authentication Configuration

LDAP (Lightweight Directory Access Protocol) is a vendor-neutral protocol for directory services. Cohesity supports LDAP as either a standalone directory source or as a mapped provider alongside AD.

ParameterDescription
NameDescriptive name for the LDAP provider
ServerIP addresses or FQDNs of the LDAP server
Domain NameDomain name used when querying via DNS
PortListening port (default: 389)
Base DNBase Distinguished Name for LDAP queries
Authentication TypeAuthentication method (e.g., Simple with Bind DN and password)

Important limitations:

Trusted Domain Support

When trusted domain discovery is enabled during AD join, Cohesity detects trust relationships. Administrators can selectively exclude certain trusted domains afterward.

For SMB shares with multiple AD domains, only Kerberos authentication is supported (NTLM is disabled). Client machines must be joined to the same domain as the cluster.

Service Account Requirements

RBAC with Active Directory

RoleAccess Level
Cluster AdministratorFull cluster management
Backup OperatorData management tasks without cluster configuration authority
Backup ViewerRead-only access
Custom RolesConfigurable based on organizational security policies

Key Points — Active Directory & LDAP

6.4 Authentication Policy Design

Configuring authentication mechanisms is only half the battle. Effective security requires well-designed policies governing password strength, session management, and audit logging.

Password Policies and Complexity Requirements

Policy ElementRecommendation
Minimum Length12+ characters
ComplexityMix of uppercase, lowercase, numbers, and special characters
RotationPer organizational policy (NIST recommends against forced periodic rotation unless compromise is suspected)
Built-in Admin AccountUnique, highly complex password stored in a secure vault
Support AccountEnable MFA; set a strong password separate from the admin account

For AD-integrated environments, the domain's Group Policy Objects (GPOs) enforce password policies centrally across all domain-joined systems, including Cohesity.

Session Timeout and Lockout Configurations

Authentication Audit Trails

Recommended Authentication Policy Baseline

Policy AreaSettingRationale
MFAEnabled for all users; TOTP as primaryPrevents credential-only attacks
MFA MethodsBoth TOTP and email enabledPrevents lockout if one method fails
SSOSAML 2.0 with signed assertionsCentralizes authentication; prevents tampering
AD IntegrationPreferred DCs configured; trusted domains reviewedEnsures reliable, secure authentication
Password Policy12+ char minimum; complex; unique per accountResists brute-force and credential stuffing
Session Timeout15-30 minutes idle timeoutLimits exposure from unattended sessions
Account LockoutLock after 5 failed attempts; auto-unlock after 30 minMitigates brute-force; limits denial-of-service risk
Audit LoggingAll authentication events logged and reviewedEnables detection of unauthorized access attempts

Key Points — Authentication Policy Design

Post-Quiz — Test Your Understanding

1. What happens when MFA enforcement is activated on a Cohesity Flex Appliance?

It can be reversed by the built-in admin after 90 days
It becomes permanent and cannot be reversed
It only applies to web UI access
It automatically expires after the grace period

2. Why does Cohesity recommend against using email as the primary MFA method?

Email codes expire too quickly
Email requires internet connectivity while TOTP does not
Email messages can be intercepted by intermediary parties
Email is not supported on Flex Appliances

3. Which SSO protocol does Cohesity support for web UI login?

OIDC only
Both SAML 2.0 and OIDC
SAML 2.0 only
OAuth 2.0 with PKCE

4. What is a critical prerequisite for Kerberos authentication between Cohesity and Active Directory?

Both systems must use the same SSL certificate
Clock synchronization within 5 minutes
LDAP provider must be configured first
The cluster must run on a Flex Appliance

5. What authentication protocol is supported for SMB shares when multiple AD domains are joined to a Cohesity cluster?

NTLM only
Both Kerberos and NTLM
Kerberos only (NTLM is disabled)
SAML-based token authentication

6. Who can reset a user's MFA credentials when they lose access to their authenticator device?

Any cluster administrator
The user can self-service reset via email
Administrators with super administrator or security administrator privileges
Only Cohesity support engineers

7. What format must the X.509 certificate be in when configuring SAML SSO on Cohesity?

.pfx format
.der format
.pem format
.cer format

8. What does Cohesity use LDAP integration primarily for?

Web UI authentication for all users
NFS exports for Unix users belonging to more than 16 groups
Replacing Active Directory authentication
Managing SSL certificates

9. According to NIST SP 800-63B guidance mentioned in the chapter, when should password rotation be enforced?

Every 30 days
Every 90 days
Only when compromise is suspected
Every time a user logs in

10. How many preferred domain controllers does Cohesity strongly recommend when joining Active Directory?

At least 1
At least 2
At least 3
None; DNS round-robin is preferred

Your Progress

Answer Explanations