- 入门指南
- 了解 UiPath Robot
- 安装要求
- 为 Unattended 自动化任务安装机器人
- 为 Unattended 自动化配置机器人
- 部署 Unattended 自动化
- 将用于 Unattended 自动化的机器人连接到 Orchestrator
- 为高密度机器人设置 Windows Server
- 通过代理服务器重定向机器人
- 使用凭据提供程序实施身份验证
- 设置包文件夹和网络路径
- 配置活动订阅源
- Using EntraID users with multifactor authentication (MFA) for unattended robots
- 为 Attended 自动化安装机器人
- 为 Attended 自动化配置机器人
- 集成
- 监管
- 故障排除

机器人管理员指南
Multifactor authentication (MFA) adds an extra layer of security by requiring users to verify their identity using two or more factors, such as:
- Something you know: a password
- Something you have: a mobile device or smart card
- Something you are: a fingerprint or face scan
MFA helps protect against unauthorized access, even if a password is compromised. However, it introduces additional complexity when setting up unattended automations.
Passwords count as a single authentication factor. Because MFA requires at least two factors, Robots cannot create user sessions using password credentials alone.
To enable MFA users to authenticate, you can use smart card credentials instead.
Virtual smart cards are easier to deploy and manage across multiple machines.
You must create virtual smart cards on all virtual machines (VMs) where robots run. Do this for each Entra ID user that executes automations.
A virtual smart card functions as a physical one, but instead of using a physical container, it relies on the machine Trusted Platform Module (TPM) chip to securely store cryptographic keys.
After creating the virtual smart cards, configure Entra certificate-based authentication to allow Entra ID users to authenticate using certificates.
The certificates used for authentication must be configured as multi-factor to meet MFA requirements.