Reference Guide
Multi-Factor Authentication

Using MFA for Mobile Client

Kron PAM’s built-in MFA can be used as a secondary layer of authentication for logging into the Kron PAM Mobile Client for its online features (Approval Management, Geo-Fencing, and Password Manager).

To enable MFA for Kron PAM Mobile Client:

  1. Navigate to Administration > System Configuration Manager.
  2. Set the mobile.application.otp.enabled parameter as true.

After these settings are done and a login operation is started on the Kron PAM Mobile Client, the application will automatically look for a Registered Token in its Offline Tokens with the name that matches the tfa.otp.issuer parameter. If there is a registered token with another name, then it will prompt the user to change the registered token. The user selects yes and enters a new token on the next page window forward to the token page for entering a new token. If the token is matched the user can log in. Once the current six-digit value of the Offline Token is validated with the server, login will be successful.

Token mismatch
Token mismatch

Token mismatch
Token mismatch

Token mismatch
Token mismatch


If there’s no Registered Token in the Kron PAM Mobile Client and MFA is enabled with the parameter above, registering a token also requires a Multi-Factor Authentication. The system will send a one-time- password (OTP) to the user’s phone number. The user will be asked to enter the OTP on her Kron PAM Mobile Client.

The Kron PAM Mobile Client MFA functionality works only with the registered tokens to ensure that the offline tokens are only working in one Kron PAM Mobile Client one application at a time.