Skip to main content

Authentication overview

SecureAuth Connect gives you a range of authentication methods to balance security, usability, and reach. You can combine methods as first-factor, second-factor, or step-up authentication depending on your use case.

This section covers how to configure each method, what users experience, and when to use one method over another.

Authentication methods

Any enabled method can be configured as first-factor or second-factor authentication in the identity pool sign-in settings.

MethodDescriptionUser needs
PasskeysDevice-bound cryptographic login, no passwordDevice with biometrics or security key
Email OTPOne-time code sent to emailEmail address
SMS OTPOne-time code sent via text messagePhone number
Voice OTPOne-time code read aloud by phone callPhone number
TOTPTime-based codes from a mobile authenticator appAuthenticator app (any)
Social loginSign in with Apple, Facebook, GitHub, Google, LinkedIn, Microsoft, or XExisting social account
Push notificationApprove or deny on a mobile deviceSecureAuth Authenticate mobile app
SymbolMatch a symbol on screen and mobile deviceSecureAuth Authenticate mobile app
QR codeScan a QR code with a mobile device to sign inSecureAuth Authenticate mobile app
SSOSign in using your company's identity providerCompany IdP account
Magic linkOne-click email loginEmail address
PasswordTraditional username and passwordUsername and password

How authentication is configured

Authentication in SecureAuth Connect is configured at three levels:

LevelWhereWhat you configure
TenantTenant Settings > Message ProvidersSet up delivery channels for OTP (email, SMS, voice). Configure code length and lifetime in MFA Settings.
WorkspaceAuthentication > Settings > MethodsEnable the authentication methods available for the workspace. Add social or enterprise identity providers under Providers.
Identity poolUsers > Sign-in and Sign-upAdd methods as first-factor or second-factor. Set a preferred method.

See also