# External SSO based MFA

In order to enable the External MFA authentication:

1. Your instance **must have** [external OIDC/SSO configured](https://docs.defguard.net/features/external-openid-providers).
2. Select the VPN Location from the dropdown list on the Network Overview, and pressing the **Edit Location** button in the top right corner of the page.
3. Select the External MFA in the menu.

<figure><img src="https://3466771104-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fe86iamwJVSYnIRsyVEAV%2Fuploads%2Fgit-blob-1035861df223e58f602d9be9bbc6d7fb40347e6d%2FScreenshot%202025-07-29%20at%2017.29.25.png?alt=media" alt=""><figcaption></figcaption></figure>

#### Client disconnect threshold

When MFA is enabled on a location, Defguard periodically (currently every **1 minute**) checks statistics if a client is connected and if the period of inactivity (defined in this option) is met, a client is disconnected.

Thus, the gateway needs to be configured to send statistics in that period.

{% hint style="info" %}
We recommend to set:

* Gateway to send statistics every 30sec
* Peer disconnect threshold we recommend it to be min. 300 (5 min)
  {% endhint %}

### Testing MFA on Defguard client

When a location has External MFA enabled, after clicking Connect in the Desktop client ([here you can find information about Mobile Client External MFA](https://docs.defguard.net/using-defguard-for-end-users/mobile-client/instance-connect#external-mfa)), there will be information displayed about authentication requirement:

<figure><img src="https://3466771104-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fe86iamwJVSYnIRsyVEAV%2Fuploads%2Fgit-blob-0b16c5f8d4cd91f3abda9bbbeb24cdccc5aebd33%2FScreenshot%202025-07-29%20at%2017.32.51.png?alt=media" alt="" width="375"><figcaption></figcaption></figure>

In order to authenticate the user will be prompted to click on Authenticate with your configured OIDC (like Authenticate with Google) - which will open the browser and start the authentication session with your OIDC/SSO provider by the [Defguard Enrollment ](https://docs.defguard.net/using-defguard-for-end-users/enrollment)service (which is the only public component).

After successful authentication, the user will be informed by the enrollment service like so:

<figure><img src="https://3466771104-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fe86iamwJVSYnIRsyVEAV%2Fuploads%2Fgit-blob-7957f02ccdb1d7442454382bd7bf0bc83aeb2d7a%2FScreenshot%202025-07-29%20at%2017.33.21.png?alt=media" alt="" width="375"><figcaption></figcaption></figure>

And the VPN should be connected.

Video describing whole process:

{% embed url="<https://www.youtube.com/embed/81MH7VXmHR0>" %}

## Biometry as an internal MFA method

Users can use biometry as an internal MFA method on their mobile devices. If a device has configured biometry as an MFA method, you will see ![](https://3466771104-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fe86iamwJVSYnIRsyVEAV%2Fuploads%2Fgit-blob-304af87944a4e6fd75ba8b638599b34ab02e7e37%2FScreenshot%202025-08-18%20at%2013.56.49.png?alt=media) icon, next to the device name.

<figure><img src="https://3466771104-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fe86iamwJVSYnIRsyVEAV%2Fuploads%2Fgit-blob-8f0427de63c2279c0641b5e16fa0cc17cc69c52e%2Fdefguard-devices-fingerprint-icon.png?alt=media" alt=""><figcaption></figcaption></figure>
