Two-factor authentication (2FA) enforces users to further prove their identity using a One-Time Password (OTP) during the login process. OTPs are unique passwords that are only valid for a single login session for a defined period of time.
Good to know...
1.OTP codes can be generated using any Authenticator App (such as Google or Microsoft Authenticator apps).
2. An internet connection or mobile service is not required to receive codes.
3. Users will be prompted to install an app of their choice when encountering OTP verification for the first time.
1.OTP codes can be generated using any Authenticator App (such as Google or Microsoft Authenticator apps).
2. An internet connection or mobile service is not required to receive codes.
3. Users will be prompted to install an app of their choice when encountering OTP verification for the first time.
Enabling two-factor authentication via OTP
To enable 2FA for your organisation:
- Log in to the Management Console and navigate to Settings >> Security Settings.
- In the Two-factor Authentication (2FA) panel, toggle the Enable two-factor authentication switch to the "on" position as shown.
- For more granular control over when 2FA is required, add any IP addresses or IP address ranges that should be excluded from needing to use 2FA in the Trusted IP Addresses field. Ensure any entries are in the correct format for them to take effect (eg. 192.168.1.200-192.168.1.250, 192.168.1.50-192.168.1.51, 192.168.1.75). Users logging in from the listed addresses and ranges will not be required to use 2FA when logging into the desktop client.
Example configurations include the IP range for your office network so that users are not required to use 2FA while logging in whilst on the office network.
If the Trusted IP Addresses field is left blank, 2FA will be enforced for all users, regardless of location.
Comments
0 comments
Please sign in to leave a comment.