*A similar flow would apply upon attempting to access any other resource – the only change is the respective directory.

Re-evaluate your MFA: Are You as Protected as You Should Be?
Step-by-step walkthrough of Silverfort MFA for accessing on-prem server with remote Powershell in an Active Directory environment.
The user attempts to log in to a server with Powershell Enter-PSSessioncommand.
Active Directory forwards the request to Silverfort. Silverfort analyzes the risk of the access request.
Based on access policy, Silverfort utilizes either its own or a 3rd party MFA service to verify the user’s identity.
The user accepts the challenge and approves his/her identity.
Silverfort informs Active Directory that the user can be trusted to access theserver.
Active Directory returns the response to the unaware client/server and grants the user access.
Active Directory returns the response to the unaware client/server and grants the user access.
How Does That Work in Practice? Verification Flow Example Zoom-In


Re-evaluate your MFA: Are You as Protected as You Should Be?

85%
Nullam placerat, nulla ac ultricies euismod, mauris lacus gravida leo, id convallis justo massa eu urna.
Step-by-step walkthrough of Silverfort MFA for accessing on-prem server with remote Powershell in an Active Directory environment.
The user attempts to log in to a server with Powershell Enter-PSSessioncommand.
Active Directory forwards the request to Silverfort. Silverfort analyzes the risk of the access request.
Based on access policy, Silverfort utilizes either its own or a 3rd party MFA service to verify the user’s identity.
The user accepts the challenge and approves his/her identity.
Silverfort informs Active Directory that the user can be trusted to access theserver.
Active Directory returns the response to the unaware client/server and grants the user access.
Active Directory returns the response to the unaware client/server and grants the user access.
How Does That Work in Practice? Verification Flow Example Zoom-In