OneLogin Hardening Guide
Identity provider hardening for OneLogin including MFA policies, user security, and SmartFactor Authentication
Overview
OneLogin is a leading cloud identity and access management platform providing SSO and MFA to thousands of enterprises worldwide. As the authentication gateway for corporate applications, OneLogin security configurations directly impact access control for all integrated systems. Compromised identity providers can provide attackers with access to the entire SaaS ecosystem.
Intended Audience
- Security engineers managing identity infrastructure
- IT administrators configuring OneLogin
- GRC professionals assessing IAM security
- Third-party risk managers evaluating identity providers
How to Use This Guide
- L1 (Baseline): Essential controls for all organizations
- L2 (Hardened): Enhanced controls for security-sensitive environments
- L3 (Maximum Security): Strictest controls for regulated industries
Scope
This guide covers OneLogin administration console security, user policies, MFA configuration, and access controls.
Table of Contents
- User Security Policies
- Multi-Factor Authentication
- Admin & Access Controls
- Session & Network Security
- Monitoring & Compliance
- Compliance Quick Reference
1. User Security Policies
1.1 Configure Password Policy
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.2 |
| NIST 800-53 | IA-5 |
Description
Configure password policies to enforce strong authentication requirements for OneLogin users.
ClickOps Implementation
Step 1: Access User Policies
- Navigate to: Security → Policies
- Select Default policy or create new policy
Step 2: Configure Password Settings
- Configure password requirements:
- Minimum length: 12+ characters (14+ for L2)
- Complexity requirements: Uppercase, lowercase, numbers, symbols
- Password history: Prevent reuse of last 10 passwords
- Password expiration: 90 days (or disable for modern approach)
- Configure lockout settings:
- Failed attempts: 5 attempts
- Lockout duration: 30 minutes
- Reset counter: After 15 minutes
Step 3: Apply Policy
- Assign policy to users or groups
- Communicate changes to users
- Monitor compliance
Time to Complete: ~20 minutes
1.2 Configure Session Controls
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.2 |
| NIST 800-53 | AC-12 |
Description
Configure session timeout and activity controls to limit exposure from idle sessions.
ClickOps Implementation
Step 1: Configure Session Timeout
- Navigate to: Security → Policies → Select policy
- Configure session settings:
- Session timeout: 8 hours (or less for L2)
- Idle timeout: 15 minutes (L2: 5 minutes)
- Force re-authentication: For sensitive apps
Step 2: Configure Session Controls
- Enable Single session enforcement if required
- Configure re-authentication for sensitive operations
- Enable session termination on logout
1.3 Enable Self-Service Password Reset
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.2 |
| NIST 800-53 | IA-5 |
Description
Configure secure self-service password reset to reduce helpdesk burden while maintaining security.
ClickOps Implementation
Step 1: Enable Self-Service
- Navigate to: Security → Policies → Select policy
- Enable Self-service password reset
Step 2: Configure Reset Methods
- Configure recovery methods:
- Security questions: 3+ questions required
- Email verification: Send reset link
- SMS verification: If enabled
- Require MFA for password reset (recommended)
Step 3: Set Security Questions
- Navigate to: Settings → Security Questions
- Configure custom security questions
- Require unique answers
2. Multi-Factor Authentication
2.1 Enforce MFA for All Users
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(1) |
Description
Require multi-factor authentication for all users accessing OneLogin.
Rationale
Why This Matters:
- Single-factor authentication is insufficient for identity providers
- MFA prevents account takeover from credential theft
- Required for compliance with most frameworks
ClickOps Implementation
Step 1: Configure Authentication Factors
- Navigate to: Security → Authentication Factors
- Click New Auth Factor
- Add desired factors:
- OneLogin Protect: Push notification app (recommended)
- Google Authenticator: TOTP app
- WebAuthn/FIDO2: Hardware keys (most secure)
- SMS: Not recommended but available
- Email: Not recommended but available
Step 2: Configure MFA Policy
- Navigate to: Security → Policies → Select policy
- Enable OTP Auth Required
- Configure MFA settings:
- Require at login: Always
- Allowed factors: Select approved factors
- Remember device: 7-30 days (or never for L3)
Step 3: Apply MFA Policy
- Apply policy to all users
- Set grace period for enrollment
- Monitor compliance
Time to Complete: ~30 minutes
2.2 Configure SmartFactor Authentication
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(13) |
Description
Enable SmartFactor Authentication for risk-based adaptive MFA.
Rationale
Why This Matters:
- Adaptive MFA uses machine learning to evaluate risk
- Low-risk logins can skip MFA step-up for better UX
- High-risk logins require additional verification
- Protects against brute force and phishing attacks
Prerequisites
- OneLogin Expert plan or higher
ClickOps Implementation
Step 1: Enable SmartFactor
- Navigate to: Security → Policies → Select policy
- Enable SmartFactor Authentication
- Configure risk thresholds
Step 2: Configure Risk Signals
- Configure risk assessment:
- Login location
- Device fingerprint
- Time of access
- Network reputation
- Set response actions for risk levels:
- Low risk: No additional MFA
- Medium risk: Require MFA
- High risk: Block and alert
Step 3: Review and Tune
- Monitor SmartFactor decisions
- Adjust thresholds based on false positives
- Review blocked attempts
2.3 Require Phishing-Resistant MFA for Admins
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 6.5 |
| NIST 800-53 | IA-2(6) |
Description
Require WebAuthn/FIDO2 hardware keys for administrator accounts.
ClickOps Implementation
Step 1: Create Admin MFA Policy
- Navigate to: Security → Policies
- Create new policy:
Admin MFA Policy
Step 2: Configure WebAuthn Requirement
- Configure MFA factors:
- WebAuthn/FIDO2: Required
- Disable: SMS, email, TOTP
- Enable Require phishing-resistant MFA
Step 3: Apply to Admins
- Create admin group if not exists
- Assign
Admin MFA Policyto admin group - Document hardware key distribution
3. Admin & Access Controls
3.1 Implement Delegated Administration
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6(1) |
Description
Configure delegated administration to implement least privilege for admin access.
ClickOps Implementation
Step 1: Review Admin Roles
- Navigate to: Users → Roles
- Review built-in roles:
- Super user: Full access (limit to 2-3)
- User admin: User management
- App admin: Application management
- Help desk: Limited support access
Step 2: Create Custom Roles
- Click New Role
- Configure role permissions:
- Name:
Tier 1 Support - Permissions: Password reset, unlock accounts
- Name:
- Apply principle of least privilege
Step 3: Assign Roles
- Assign appropriate roles to administrators
- Document role assignments
- Regular review of admin access
3.2 Configure IP Address Allowlisting
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 13.5 |
| NIST 800-53 | AC-17, SC-7 |
Description
Restrict access to OneLogin from approved IP addresses.
ClickOps Implementation
Step 1: Configure IP Restrictions
- Navigate to: Security → Policies → Select policy
- Enable IP address restrictions
- Add allowed IP addresses/ranges:
- Corporate network
- VPN egress IPs
- Trusted partner IPs
Step 2: Configure Response
- Configure action for unauthorized IPs:
- Block access: Deny login
- Require MFA: Step-up authentication
- Alert: Notify administrators
Step 3: Test and Validate
- Test from allowed IPs
- Verify blocked from unauthorized IPs
- Document emergency procedures
3.3 Protect Privileged Accounts
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 5.4 |
| NIST 800-53 | AC-6 |
Description
Implement additional protections for privileged administrator accounts.
ClickOps Implementation
Step 1: Identify Privileged Accounts
- Navigate to: Users → Filter by admin roles
- Document all privileged accounts
- Verify business need for each
Step 2: Apply Enhanced Protections
- Create dedicated policy for admins
- Configure:
- Shorter session timeout
- Mandatory MFA at every login
- IP restrictions (if possible)
- Enhanced logging
Step 3: Implement Separation of Duties
- Use separate accounts for admin vs. daily work
- Require approval for privilege changes
- Regular access reviews
4. Session & Network Security
4.1 Configure TLS Requirements
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 3.10 |
| NIST 800-53 | SC-8 |
Description
Ensure all OneLogin communications use strong TLS encryption.
Validation
- Verify OneLogin portal uses TLS 1.2+
- Check SAML connections use HTTPS
- Validate API connections are encrypted
4.2 Configure Brute Force Protection
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 6.3 |
| NIST 800-53 | AC-7 |
Description
Configure account lockout and brute force protection.
ClickOps Implementation
Step 1: Configure Lockout Policy
- Navigate to: Security → Policies → Select policy
- Configure lockout settings:
- Max failed attempts: 5
- Lockout duration: 30 minutes
- Counter reset: 15 minutes
Step 2: Enable Detection
- Enable login anomaly detection
- Configure alerts for repeated failures
- Block known malicious IPs
4.3 Configure Device Trust
Profile Level: L2 (Hardened)
| Framework | Control |
|---|---|
| CIS Controls | 13.7 |
| NIST 800-53 | AC-17 |
Description
Implement device trust policies to verify device security posture.
ClickOps Implementation
Step 1: Enable Desktop SSO
- Navigate to: Security → Desktop SSO
- Configure device trust requirements
- Deploy OneLogin desktop agent
Step 2: Configure Device Policies
- Configure device requirements:
- Domain-joined devices
- Certificate validation
- Managed devices only
5. Monitoring & Compliance
5.1 Enable Audit Logging
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.2 |
| NIST 800-53 | AU-2 |
Description
Enable and monitor audit logs for security events.
ClickOps Implementation
Step 1: Access Event Logs
- Navigate to: Activity → Events
- Review login and admin events
- Export logs for SIEM
Step 2: Configure SIEM Integration
- Navigate to: Settings → SIEM Integration
- Configure log export:
- Splunk
- AWS S3
- Custom webhook
- Verify log delivery
Key Events to Monitor:
- Failed login attempts
- Admin configuration changes
- MFA enrollment changes
- Password resets
- User provisioning/deprovisioning
5.2 Configure Security Alerts
Profile Level: L1 (Baseline)
| Framework | Control |
|---|---|
| CIS Controls | 8.11 |
| NIST 800-53 | SI-4 |
Description
Configure alerts for security-relevant events.
ClickOps Implementation
Step 1: Configure Alert Rules
- Navigate to: Settings → Alerts
- Create alert rules for:
- Multiple failed logins
- Admin privilege changes
- Policy modifications
- Unusual login locations
Step 2: Configure Notification
- Set notification recipients
- Configure escalation procedures
- Test alert delivery
6. Compliance Quick Reference
SOC 2 Trust Services Criteria Mapping
| Control ID | OneLogin Control | Guide Section |
|---|---|---|
| CC6.1 | MFA enforcement | 2.1 |
| CC6.1 | Password policy | 1.1 |
| CC6.2 | Delegated admin | 3.1 |
| CC6.6 | IP allowlisting | 3.2 |
| CC7.2 | Audit logging | 5.1 |
NIST 800-53 Rev 5 Mapping
| Control | OneLogin Control | Guide Section |
|---|---|---|
| IA-2(1) | MFA | 2.1 |
| IA-2(13) | Adaptive MFA | 2.2 |
| IA-5 | Password policy | 1.1 |
| AC-6(1) | Least privilege | 3.1 |
| AU-2 | Audit logging | 5.1 |
Appendix A: Plan Compatibility
| Feature | Starter | Advanced | Professional | Expert |
|---|---|---|---|---|
| SSO | ✅ | ✅ | ✅ | ✅ |
| MFA | Basic | ✅ | ✅ | ✅ |
| SmartFactor | ❌ | ❌ | ❌ | ✅ |
| Delegated Admin | ❌ | ❌ | ✅ | ✅ |
| Custom Policies | ❌ | ✅ | ✅ | ✅ |
| SIEM Integration | ❌ | ❌ | ✅ | ✅ |
Appendix B: References
Official OneLogin Documentation:
- Compliance & Certifications
- Support Portal
- OneLogin User Policies
- Best Practices for Advanced Authentication
- SAML SSO Best Practices and FAQs
- How to Authenticate Users
- Rethinking MFA: Smarter Security
API Documentation:
Compliance Frameworks:
- SOC 1 Type II, SOC 2 Type II, ISO 27001, ISO 27017, ISO 27018, HIPAA, GDPR, Privacy Shield — via OneLogin Compliance
Security Incidents:
- May 2017: Threat actor used a stolen AWS key to access OneLogin’s U.S. data center infrastructure for approximately seven hours, compromising database tables containing user data, app configurations, and encryption keys. OneLogin could not rule out the attacker’s ability to decrypt customer data. — Krebs on Security Report
Changelog
| Date | Version | Maturity | Changes | Author |
|---|---|---|---|---|
| 2025-02-05 | 0.1.0 | draft | Initial guide with MFA, policies, and admin controls | Claude Code (Opus 4.5) |
Contributing
Found an issue or want to improve this guide?
- Report outdated information: Open an issue with tag
content-outdated - Propose new controls: Open an issue with tag
new-control - Submit improvements: See Contributing Guide