Authentication Profiles
in Delinea
Authentication Profiles define the multi-factor requirements users must satisfy across different scenarios: platform logins, secret access, privilege elevation, and granular policy enforcement. This guide walks through every aspect of creating and managing these profiles.
Where Profiles Are Applied
Creating Auth Profiles
Authentication profiles are configured in Admin settings and serve as reusable templates. Follow this step-by-step process to create your first profile.
MFA-SecretAccess-HighPriv. Optionally add a description explaining its use case.Interactive: Build a Profile
name: "Unnamed Profile"
min_factors: 2
primary_method: "TOTP"
challenge_cache_min: 30
allow_device_remember: false
bypass_service_accounts: false
require_on_every_access: false
LOGIN-, SECRET-, PRIV-). This makes policy assignment and auditing significantly easier as your environment grows.MFA Requirements
for Logins
Attaching an authentication profile to the login policy ensures users must pass an MFA challenge before reaching the Delinea dashboard. This protects against credential compromise.
| Method | Security Level | User Experience | Best For |
|---|---|---|---|
| FIDO2 / WebAuthn | Highest | Hardware key tap or biometric | Privileged admins, PAM access |
| TOTP App | High | Enter 6-digit code from app | Standard enterprise MFA |
| Push Notification | High | Approve/deny on mobile | Fast, mobile-friendly logins |
| RADIUS | Medium | Delegates to RADIUS server | Legacy infra integration |
| Email OTP | Medium | Code sent to email | Low-risk accounts, fallback |
| SMS OTP | Lower | Code via text message | Last resort / legacy only |
The authentication flow when a Login MFA policy is attached:
MFA for Secret Access
Separate from login MFA, you can require an additional authentication challenge specifically when a user retrieves a secret — a credential, API key, or certificate. This adds a second layer of friction at the most sensitive operation.
Secret Policy MFA Matrix
| Secret Type | Recommended Trigger | Suggested Profile | Cache Duration |
|---|---|---|---|
| 🔴 Root / Domain Admin | Every View | FIDO2 + TOTP | None (0 min) |
| 🟠 Service Account Creds | Every Session | TOTP or Push | 30 minutes |
| 🟡 Database Passwords | Every Session | TOTP or Push | 30 minutes |
| 🟢 Application API Keys | Timer-based | TOTP | 1 hour |
| ⚪ Personal Dev Creds | Once Per Session | Push or Email | 8 hours |
Step-Up Privilege
Elevation
Step-up authentication is triggered when a user requests elevated privileges — for example, launching a privileged session, checking out a high-risk secret, or activating just-in-time access. A re-authentication challenge confirms intent and identity.
PRIV-StepUp-Strict.Common scenarios where step-up MFA is triggered:
Just-In-Time (JIT) privilege grants temporary, time-bound access. Here's the full flow with step-up MFA:
Granular Access
Control
Authentication profiles can be applied at extremely fine-grained levels — per folder, per secret, per role, per IP range, or per time window. This allows you to build layered, adaptive security policies tailored to your risk profile.
Dimensions of Granularity
Interactive: Granular Policy Builder
Select conditions to see which authentication profile would apply:
Inheritance Model
Delinea uses a policy inheritance model. Profiles cascade from global → folder → secret, with child objects able to inherit, override, or block inheritance from their parent.
Pre-Rollout Checklist
- ✓Inventory all existing secrets and categorize by risk level
- ✓Create at minimum 3 profiles: Low, Medium, High security tiers
- ✓Map AD groups to appropriate authentication profiles
- ✓Define IP ranges for trusted networks and configure bypass conditions
- ✓Test all profiles with pilot users before broad enforcement
- ✓Document the inheritance model and naming convention in your runbook
- ✓Set up alerting for MFA failures exceeding threshold
- ✓Schedule quarterly review of all authentication profile assignments
Knowledge Check
Test your understanding of Delinea authentication profiles. Select the best answer for each question.