Multi-Factor Authentication

Add a second layer of login verification to protect against stolen credentials.

Available MFA Methods

MethodHow It WorksEdition
SMS OTPOne-time code sent to user's registered phoneAll
Email OTPOne-time code sent to user's emailAll
New Device CheckExtra verification when logging in from a new deviceAll
TOTP (Authenticator App)Time-based codes from Google Authenticator / AuthyPro+

Enabling MFA

  1. Go to Admin Console → Settings → Security → MFA
  2. Choose your preferred MFA method(s)
  3. Set the enforcement scope: All Users, Specific Groups, or Administrators Only
  4. Configure the grace period for existing users (e.g., 7 days to enroll)
  5. Save and publish

New-Device Verification

When enabled, users logging in from an unrecognized device must complete an additional verification step. The device is then added to their trusted device list.

  • Admins can view and revoke trusted devices per user
  • Useful for detecting unauthorized access without requiring MFA on every login
✅ Enabling at minimum the new-device check is recommended for all deployments. It catches most account-sharing and unauthorized access attempts.