Page tree

Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Updated AuthnContextClassRef value to to reflect UCTrust adoption of REFEDS MFA profile.


The MyAccess single-sign-on system is integrated with the Duo MFA system.  However, it does not require users to use multi-factor authentication unless an application requests it.  Applications can request that the MyAccess SSO system require the additional security layer of a MFA login by changing parts of the SAML Request it sends to the MyAccess Identity Provider (IdP).  More specifically, the SAML Request must include an "AuthnContextClassRef" element with a value of "http", which is defined by InCommonby the REFEDS (Research and Education FEDerationS) group.  Read up on InCommon's the REFEDS MFA assurance profile and the  and the associated specifications and assumptions for more details.


See the most up-to-date simpleSAMLphp configuration guide for details on how to change the "AuthnContextClassRef" that is sent to the MyAccess Identity Provider in the SAML Request.  The value of the "AuthnContextClassRef" must be "http".

Important Notes

  •  If an application requests multi-factor authentication, then ALL users who use MyAccess to login to that application must use Duo MFA to gain access to that application.  It's not possible to exempt some users from using MFA while requiring MFA for other users.
  • Duo MFA uses the username that the user typed into the MyAccess login page to process multi-factor authentication.  If users use a username to login to MyAccess that is not already enrolled into Duo MFA, they'll be denied access to your application.

    EXAMPLE: Let's say you're enrolled in the Duo MFA system with the "jdoe" Active Directory username, but you usually login to MyAccess with your old SF ID of "SF123456".  If you login to MyAccess using your SF123456 username and associated password, then attempt to access the above application protected by the simpleSAMLphp software that requests multi-factor authentication, you'll be denied access at during the Duo authentication process, even though you are already enrolled into Duo with your "jdoe" AD account.  If you want to use Duo MFA with your AD account, you must login to MyAccess with the same "jdoe" username and password before going to a MFA protected SSO application.