Skip to main content

Multi-Factor Authentication (MFA)

Use Two-Factor Authentication (2FA) to protect client applications, access scopes in services, and access to the SecureAuth platform itself.

Multi-Factor Authentication Enforcement Points

Organizations may require Multi-Factor Authentication:

Restricting Access to Client Applications by Using MFA

After the user enters the username and password, they are prompted to select an additional verification method: e-mail or SMS. The methods are available depending on what data the user has added and enabled for MFA on the identity provider (IDP) side. After selecting the email verification, for example, a one-time-password (OTP) code is sent to the user via mail. After providing the code, it's verified and, either allows the access or denies it, depending on the outcome of the verification. If the whole process succeeds, the client app can proceed to getting consent and requesting an access token. This process is outlined in the diagram below:

Restricting_Access_to_Client_Applications_by_Using_MFA.svg

Learn how

Enforcing MFA for SecureAuth Platform

Organizations may require multi-factor authentication from the administrator user while logging into the SecureAuth platform.

Learn how

One Time Passwords (OTPs)/Verification Codes for MFA

MFA supported in SecureAuth platform uses the combination of the knowledge factor (username and password), or passkey, and the possession factor (One Time Password (OTP) also called verification code).

OTPs used for an additional verification of the user's identity can be handled in SecureAuth platform in two ways:

  • OTP sent via SMS (supported by Twilio)

  • OTP sent via email (supported by any SMTP gateway)

The verification codes' length and lifetime is configurable.