Last Updated: December 13, 2024
The LoginTC OWA Connector protects access to your Microsoft Outlook Web App by adding a second factor LoginTC challenge to existing username and password authentication.
Explore how LoginTC can add MFA to your Microsoft Outlook Web App (OWA) below.
Subscription Requirement
Your organization requires the Business or Enterprise plan to use the LoginTC OWA Connector. Explore Pricing Plans
After entering the username and password into the Outlook Web App login, the user is shown a selection of second factor options. The user clicks a button to receive a LoginTC push notification, authenticates and is logged in.
ActiveSync and Outlook App Access
The LoginTC OWA Connector adds a two-factor authentication prompt to Outlook on the web (formerly Outlook Web App). The LoginTC OWA Connector does not have any impact on ActiveSync, Outlook App authentication or other Exchange mail protocols such as POP3 and IMAP. In most cases, these other protocols should be either disabled or protected in another way to ensure that all access to your Exchange is protected with two-factor authentication.
See the LoginTC OWA Connector ActiveSync and Outlook App Access knowledge base article for more information.
Prefer Reading a PDF?
Download a PDF file with configuration instructions:
Before proceeding, please ensure you have the following:
Working OWA Deployment
It is strongly recommended that you have a working and tested Outlook Web App deployment prior to adding LoginTC authentication.
Start by creating a LoginTC Application for your deployment. An Application represents a service (e.g. An application is a service (e.g., VPN or web application) that you want to protect. e) that you want to protect with LoginTC.
Create a LoginTC Application in LoginTC Admin Panel, follow Create Application Steps.
If you have already created a LoginTC Application for your deployment, then you may skip this section and proceed to Installation.
[/callout]
Normalize Usernames
Usernames in Outlook Web App are typically in the form “CORP\john.doe”, while in the LoginTC Admin Panel it is generally more convenient to simply use “john.doe”.
Configure Normalize Usernames
from the Domain settings by navigating to Domains > Your Domain > Settings.
Select Yes, Normalize Usernames
scroll down and click Update
.
[/callout]
Follow the instructions to install the LoginTC OWA Connector:
IIS service reset
The installer will restart IIS services upon completion and this will impact other dependent services. We recommend performing these actions during a change windows.
The LoginTC OWA Connector is now installed and protecting your Outlook Web App.
Exchange Cumulative Updates (CU)
It is recommended to reinstall the connector when installing an Exchange Cumulative Update (CU). See the following Knowledge Base article for more information: LoginTC stopped prompting for authentication after installing Exchange Cumulative Update (CU)
This chapter demonstrates the possibilities of the LoginTC OWA Connector from both an administrator’s and end user’s point of view.
The OWA initial login page where the user enters their username and password is unmodified.
After successfully authenticating with their username and password, the user is presented with options to log in with LoginTC. The user may select to authenticate using LoginTC push, bypass codes, or OTPs.
If the user selects LoginTC push, they are informed to approve the LoginTC requst on their device. The user is also presented with an option to remeber their LoginTC login choice. The next time the user logs in they will automatically receive a LoginTC push notification. The user may also cancel the login attempt and return to the login page.
The user is brought to their OWA homepage after successfully authenticating with LoginTC.
LoggingThe LoginTC OWA Connector logs events to the Microsoft Event Viewer under Applications and Service Logs → LoginTC. LoginTC OWA Connector event logs are helpful in debugging issues.
PassthroughPassthrough allows you to specify which set of users should be challenged with LoginTC second-factor authentication, and which ones will not. This is often useful when testing and when rollying out a deployment to minimize the impact on others.
Setting a static user list tells the LoginTC OWA Connector which users must be challenged for LoginTC second-factor authentication. All other users will be passed through without requiring a second-factor authentication.
Instructions to set a static list of users to be challenged:
C:\Program Files\Cyphercor\LoginTC OWA Connector
.users.txt
in Notepad.DOMAIN\username
If the users.txt
file does not exist then all users will be challenged with LoginTC second-factor authentication.
Setting a group list tells the LoginTC OWA Connector which AD security group members must be challenged for LoginTC second-factor authentication. All other users not belonging to any of the listed AD security groups will be passed through without requiring a second-factor authentication.
Instructions to set a list of AD security groups to be challenged:
C:\Program Files\Cyphercor\LoginTC OWA Connector
.groups.txt
in Notepad.If the groups.txt
file does not exist then all users will be challenged with LoginTC second-factor authentication (unless a static user list file exists).
Setting an IP Address list tells the LoginTC OWA Connector not to challenge users with LoginTC second-factor authentication when they come from these IP Addresses.
Instructions to set a list of ip addresses to bypass:
C:\Program Files\Cyphercor\LoginTC OWA Connector
.ipaddresses.txt
in Notepad.Useful tool: https://www.ipaddressguide.com/cidr.
UninstallationTo uninstall the LoginTC OWA Connector, simply navigate to the Add or remove programs in the Windows Control Panel, find LoginTC OWA Connector in the list and follow the prompts.
Troubleshooting
LoginTC stopped prompting after installing Exchange CU
If LoginTC has stopped prompting for authentication after installing an Exchange Cumulative Update (CU), see the following Knowledge Base article: LoginTC stopped prompting for authentication after installing Exchange Cumulative Update (CU)
Email Support
For any additional help please email support@cyphercor.com. Expect a speedy reply.
You may also be interested in our: