Camp Rubrik: Data Security Foundations
  • Camp Rubrik: Data Security Foundations
    • Lab environment
    • Welcome to Zaffre
      • Tools you will be leveraging
      • SLA driven policy engine
      • Role Based Access Control (RBAC)
      • In-place Recovery Plans
    • Identify and Recover from an attack
      • The attack
        • Navigate the two storefronts
        • Ransom note
      • Anomaly Detection
        • Accessing Anomaly Detection
        • Visibility into the attack
        • Investigations page
        • Determining blast radius
        • Instant file recovery
      • Threat Hunting
        • Identifying the entry point of an adversary
        • Building a threat hunt
        • Monitoring a threat hunt in progress
        • Review a completed hunt
      • Sensitive Data Monitoring
        • Accessing Sensitive Data Monitoring
        • Visibility into sensitive data
        • Cyber incident response
        • Business as usual
        • Policies
        • Analyzers
        • Custom analyzers & policies
        • Reporting
      • All Clear To Recover
      • Cyber Recovery
        • Accessing Cyber Recovery
        • Forensic Analysis
        • Recovery Plans
        • In-Place recovery
      • Data Security Command Center
        • Accessing Data Security Command Center
        • Platform Security
        • Anomaly Detection
        • Data Security Posture
        • Data Protection and Recovery
        • Multi-factor Authentication (MFA) with Time-based One-Time Passwords (TOTP)
      • Conclusion
Powered by GitBook
On this page
Export as PDF
  1. Camp Rubrik: Data Security Foundations
  2. Identify and Recover from an attack
  3. Data Security Command Center

Multi-factor Authentication (MFA) with Time-based One-Time Passwords (TOTP)

PreviousData Protection and RecoveryNextConclusion

Last updated 1 year ago

Now that your environment is up and running and you have some insight into the security score let's set up MFA with TOTP for the user to add an additional layer of security to avoid any unauthorized access to the environment.

NOTE: Please download and configure one of the following third-party authenticator applications on your phone to enable a Multi-factor Authentication or two-step verification configuration.

  • Google Authenticator

  • Microsoft Authenticator

  • Okta Authenticator

If you already have one on your phone, feel free to use it by adding a new Organization.

  1. Under the user icon, click User Preferences and navigate to Multi-factor authentication.

  1. Toggle the button to turn on Multi-factor authentication, as it is currently disabled for this user.

  1. Open the Authenticator on your phone and add an Organization or scan a QR code.

  2. Enter the code from your Authenticator app into the Verification Code. Click Continue.

  1. Under the user icon, click Logout. Re-login to RSC, and now you can enter the TOTP as the verification code from your authenticator application.

Rubrik MFA provides an additional authentication security layer. In addition to the username and password, TOTP uses an app to deliver a single-use numeric code as the second authentication factor.

Set up MFA
Set up MFA
Set up MFA
Re-login