Skip to main content
Two-Factor Authentication
Stephan Botha avatar
Written by Stephan Botha
Updated over 2 years ago

Two-factor authentication (also known as 2FA) is a type of multi-factor authentication. It is a method of confirming users' claimed identities by using a combination of two different factors: 1) something they know, 2) something they have.

To setup Two-Factor Authentication within the system users will need to login and go to Menu > User > Two-Factor Authentication.

Once here click on ‘Add New Device’ and follow the steps provided below:

1.

Do not use a shared device for Two-Factor Authentication. If you do, your account may be at risk of being accessed by other people.

2.

Download, install and setup an appropriate Two-Factor Authentication App for your chosen device, such as your mobile phone or tablet. Examples of supported Apps are shown below.

chrome_2019-01-07_14-37-05

3.

Open the App on your device.

4.

Scan the QR code into the App. Alternatively, enter the manual code if you are unable to scan the QR code. Example:

chrome_2019-01-07_14-38-00

5.

Once you have successfully registered the secret code to your device, your device should start generating authentication codes.

6.

Open the Device Details section of this screen and enter a unique name for your device, as well as an authentication code it has recently generated. This code will be used to verify that your device has been configured correctly.

o

If you are unable to generate a successful verification code, please try removing the account from your device and repeat step #4.

chrome_2019-01-07_14-39-16

7.

Upon successfully saving your new device, you will now be required to supply a valid authentication code when logging into the system.

Notes

If you have multiple devices configured, you will only need to enter a valid authentication code from a single device.

Deleting or disabling all of the devices will disable Two-Factor Authentication.

Two-factor authentication is not a substitute for strong passwords. Even when it is enabled, you should still adhere to good password practices.

If a device becomes lost, stolen or replaced, we recommend you remove it from the system as soon as possible.

If using Authy, it is capable of sharing authentication codes across devices using your Authy account. When enabled, this would mean you only need to register a single device/account with the system, and then choose whichever device you like (provided that all your devices have Authy installed and configured for your Authy account).

Did this answer your question?