diff --git a/docs/pages/access-controls/guides/per-session-mfa.mdx b/docs/pages/access-controls/guides/per-session-mfa.mdx index 7321d167f4091..0b1a798ed1a5e 100644 --- a/docs/pages/access-controls/guides/per-session-mfa.mdx +++ b/docs/pages/access-controls/guides/per-session-mfa.mdx @@ -1,24 +1,27 @@ --- title: Per-session MFA -description: Require MFA checks for user SSH and Kubernetes sessions. +description: Require MFA checks to initiate sessions. videoBanner: j8Ze7HhjFGw --- # Per-session MFA -Teleport supports multi-factor authentication on every SSH and Kubernetes -"connection" (a single `tsh ssh` or `kubectl` call). This is an advanced -security feature that protects users against compromises of their on-disk -Teleport certificates. +Teleport supports requiring additional multi-factor authentication checks +when starting new: - +- SSH connections (a single `tsh` call) +- Kubernetes sessions (a single `kubectl` call) +- Desktop sessions +This is an advanced security feature that protects users against compromises of +their on-disk Teleport certificates. + + In addition to per-session MFA, enable login MFA in your SSO provider and/or for all [local Teleport users](../../setup/reference/authentication.mdx#local-no-authentication-connector) to improve security. - - +
@@ -93,8 +98,8 @@ spec: ... ``` -Role-specific enforcement only applies when accessing SSH nodes or Kubernetes -clusters matching that role's `allow` section. +Role-specific enforcement only applies when accessing resources matching a +role's `allow` section. #### Roles example @@ -174,7 +179,6 @@ $ tsh ssh prod3.example.com If per-session MFA was enabled cluster-wide, Jerry would be prompted for MFA even when logging into `dev1.example.com`. - ## Database access MFA Database access supports per-connection MFA. When Jerry connects to the database @@ -213,3 +217,5 @@ Current limitations for this feature are: If you enable per-session MFA checks cluster-wide, you will not be able to use Application access. We're working on integrating per-session MFA checks for these clients. +- For Desktop Access, only WebAuthn devices are supported. Teleport does not + support U2F devices for Desktop Access MFA.