Skip to main content

SecureAuth MFA app user guide

mobile_app_update.png

Welcome to the rebranded SecureAuth MFA app!

The mobile app connects seamlessly with products in SecureAuth to provide multi-factor authentication (MFA) to make logins more secure. The SecureAuth MFA app generates login passcodes and sends you a push notification for one-tap authentication on your mobile device.

Authenticator apps by SecureAuth have two names in the app stores for different product deployments.

  • SecureAuth Authenticate – This app supports login requests coming from the SecureAuth® Identity Platform and its products.

    The app icon name will appear as Authenticate.

  • SecureAuth MFA – This app formerly known as Arculix Mobile, supports login requests coming from Arculix and its products.

    The app icon name will appear as SecureAuth MFA.

mobile_app_names.png

Regardless of the name, your experience within the app will be tailored to your needs based on your login credentials.

For most of you, if you already have one or both of these apps installed, the app updates will be seamless for you. If you have any questions, reach out to a system administrator in your organization.

Task A: Download and install SecureAuth MFA

In the app store, search for SecureAuth MFA (formerly Arculix Mobile).

Android

Google Play link: SecureAuth MFA (formerly Arculix Mobile)

Apple

App Store link: SecureAuth MFA (formerly Arculix Mobile)

Task B: Connect your SecureAuth MFA app

Next, you will need to connect the SecureAuth MFA app to your user account.

Depending on the configurations set by your organization, you can connect your account in any of the following ways.

Use this method if your organization provides a QR code set up option.

  1. Follow your organization's instructions to get the QR code to enroll your mobile device.

  2. Open the SecureAuth MFA app. Then, scan the QR code in one of these ways:

    • Open QR scan. In the bottom row of icons, tap QR Scan.

    • Add Account. Tap Settings (gear icon) > scroll down to Add Account.

  3. Tap Scan QR Code and scan the QR code displayed on your computer.

    You might be prompted to verify your identity. This will depend on your organization's settings.

Use this method if your organization provides email pairing.

  1. On your mobile device, open SecureAuth MFA app.

  2. Tap No QR Code? Sign up!.

    secureauth_mfa_001_mobileimage.png

    Tap No QR Code? Sign up!

  3. Next, enter your organization email.

    You will receive an email with instructions to pair.

    secureauth_mfa_002_mobileimage.png

    Enter email address

    secureauth_mfa_003_mobileimage.png

    Check your email

  4. On your computer, open your email.

  5. Use the SecureAuth MFA app to scan the QR code in the body of the email.

    Take note that the QR code in the email is only good for a certain amount of time as set by your organization. If it expires, repeat step 2 above to get another email request with a new QR code.

Task C: Login and verify with SecureAuth MFA

Login and verify access with SecureAuth MFA.

  1. Login to your computer or application.

  2. SecureAuth MFA prompts you to take action to approve access.

    This will depend on your organization's settings. To approve access, you may need to tap "Accept", tap the matching symbol, use biometrics, or enter the app's displayed passcode.

    secureauth_mfa_006_mobileimage.png

    Accept to approve

    secureauth_authenticate_002_mobileimage.png

    View passcode

    secureauth_authenticate_009.png

    Symbol Push login method

Other features in SecureAuth MFA

Some key features in SecureAuth MFA are described next.

Multi-Accounts

Use the fast switch menu at the top of the Dashboard to switch accounts.

secureauth_mfa_010_mobileimage.png

Multi-accounts

Working with multiple accounts. Some features work simultaneously for all accounts:

  • It shows all the TOTPs for each account on the app screen.

  • It displays the Push requests at any time and works for any account. It also displays which account the transaction request is tied to. You do not need to switch to a specific account to respond to incoming transaction requests.

  • When using the QR code scan, doing a web login, or pairing a workstation, it prompts you for which account the service belongs to.

secureauth_mfa_011_mobileimage.png

Multi-account view in Settings

secureauth_mfa_012_mobileimage.png

Select account when using QR code scan

Dashboard

Key sections of the Dashboard: 

  • Workstations. Displays the number of paired workstations. Your organization might set this up to require MFA as part of the login experience to your computer.

  • Devices. Displays the number of connected devices for your account with Secure MFA.

  • Auth Profile Strength. Determines the strength of your authentication profile. A number below 100% means your authentication profile is incomplete. Your organization sets this up to build device trust and ensure ongoing security.

  • Recent Transactions. Displays history of previous login attempts.

secureauth_mfa_007_mobileimage.png

Dashboard view

QR code

On the Dashboard, at the bottom, tap QR Scan.

secureauth_mfa_008_mobileimage.png

QR scan

Offline Code

Access time-based one-time passcode (TOTP) for offline logins.

Your organization has a zero-knowledge policy, so offline codes are stored only on the user device. Each time you scan a new QR code, reconnect an account, or reconnect a computer, it refreshes the offline codes. This prevents conflicts between new and old offline codes for the same account.

secureauth_mfa_013_mobileimage.png

Offline Code tab

App Lock

(as a required setting)

As a required setting. Your system administrator might have a policy that requires you to set an App Lock to view time-based one-time passcodes (TOTP). If this is the case, you will receive a notification to turn on App Lock and set a passcode (PIN).

Depending on your organization settings, you'll set up a 4-digit or 8-digit passcode (PIN). If you've previously set up a PIN and there is a policy change, it might require you to change your PIN.

Note

Be sure to remember or securely store your passcode (PIN) in a safe place. If you forget your PIN, you will need to pair your device again.

secureauth_authenticate_006_mobileimage.png

Set PIN for App Lock

Note

When the App Lock option is turned on and the app detects a change in biometrics, like adding or removing a fingerprint on the mobile device, it will unpair all accounts.

Be careful when changing biometric settings on shared devices.

Consider this scenario -- Alice has connected accounts in SecureAuth MFA. Bob does not.

Alice and Bob share a mobile device. If Bob removes or adds a fingerprint, SecureAuth MFA will unpair all accounts for Alice.

Alice will have to connect their mobile device again with SecureAuth MFA.

App Lock

(as an optional setting)

App Lock is in the Settings menu.

As an optional setting. Add another layer of security by turning on App Lock. When you turn on this feature, it requires you to enter a passcode (PIN) or use biometrics like Face ID to approve an authentication request or to view offline codes.

Note

Be sure to remember or securely store your passcode (PIN) in a safe place. If you forget your PIN, you will need to pair your device again.

secureauth_mfa_009_mobileimage.png

App Lock setting

authenticate_app_lock_002_mobileimage.png

Turn on Passcode and Face ID

You must turn on and set up a Passcode (PIN) first before you can enable Face ID. The Passcode option is the fallback method in case the the biometrics method does not work.

Note

When the App Lock option is turned on and the app detects a change in biometrics, like adding or removing a fingerprint on the mobile device, it will unpair all accounts.

Be careful when changing biometric settings on shared devices.

Consider this scenario -- Alice has connected accounts in SecureAuth MFA. Bob does not.

Alice and Bob share a mobile device. If Bob removes or adds a fingerprint, SecureAuth MFA will unpair all accounts for Alice.

Alice will have to connect their mobile device again with SecureAuth MFA.

FAQs and troubleshooting

Read on to learn more or troubleshoot issues with the SecureAuth MFA app.

I have a new phone. How do I connect the SecureAuth MFA app again?

Follow these instructions to connect your new mobile device to your account.

  1. Go to the app store and install the SecureAuth MFA app.

  2. Follow your organization's policy to connect via Method 1: Connect with QR code, Method 2: Email pairing, or Method 3: Magic link.

    Tip

    If your computer requires a secure login with MFA, you can use another method, like your password or a code via SMS, until you can reconnect your new mobile device with the SecureaAuth MFA app.

I have a new phone. How can I log in to my computer if it requires MFA until I can connect my new phone with SecureAuth MFA?

Use another form of MFA like password or a code via SMS to log in to your computer. Then, follow the steps to connect your new mobile device to your account.

  1. Go to the app store and install the SecureAuth MFA app.

  2. Follow your organization's policy to connect via Method 1: Connect with QR code, Method 2: Email pairing, or Method 3: Magic link.

    Tip

    If your computer requires a secure login with MFA, you can use another method, like your password or a code via SMS, until you can reconnect your new mobile device with the SecureaAuth MFA app.

I have a rooted or jailbroken device. Can I pair my device with SecureAuth MFA?

No. A warning message will display when you try to open the SecureAuth MFA app: SecureAuth MFA does not support modified devices. Please restore the device to factory settings in order to use this application.

Workaround: Restore your mobile device to its factory settings and try again.

When I try to pair my device, why do I see this message: SecureAuth MFA does not support modified devices. Please restore the device to factory settings in order to use this application?

SecureAuth MFA has detected that the mobile device is rooted or jailbroken. The SecureAuth MFA app will not work at all on rooted or jailbroken devices.

Workaround: Restore your mobile device to its factory settings and try again.

When I try to pair my device, why do I see this message: This device cannot be paired with SecureAuth MFA as your organization requires support for a hardware security module?

Your organization has a policy setting that requires built-in security features like Touch ID and Face ID on your mobile device.

Why am I getting this message in SecureAuth MFA: "We have detected a change in the Face IDs on this device. For your security, Face ID was disabled in SecureAuth MFA and you have been logged out."

SecureAuth MFA has a setting called App Lock. It lets you use biometrics like Face ID or fingerprint to approve an authentication request.

Workaround: Connect your mobile device again with SecureAuth MFA, using Method 1: Connect with QR code, Method 2: Email pairing, or Method 3: Magic link.

Note

When the App Lock option is turned on and the app detects a change in biometrics, like adding or removing a fingerprint on the mobile device, it will unpair all accounts.

Be careful when changing biometric settings on shared devices.

Consider this scenario -- Alice has connected accounts in SecureAuth MFA. Bob does not.

Alice and Bob share a mobile device. If Bob removes or adds a fingerprint, SecureAuth MFA will unpair all accounts for Alice.

Alice will have to connect their mobile device again with SecureAuth MFA.