Skip to main content
Version: v25.07.31

MultiFactor Authentication

This guide shows administrators and users how to turn on and set up Multi-Factor Authentication (MFA). It explains why MFA makes login safer, where to find the settings, and provides step-by-step instructions for setup and logging in.


What Problem Does It Solve?

  • Traditional username-password logins are vulnerable if credentials are stolen.
  • MFA introduces an additional verification layer (OTP via email), reducing unauthorized access risks.
  • Ensures compliance with modern security standards and protects sensitive data.

What Will the User Achieve After Reading This?

Administrators will:

  • Enable MFA for specific accounts
  • Configure global OTP timeout settings
  • Ensure secure login policies

End Users will:

  • Experience enhanced login security
  • Authenticate using a 6-digit OTP sent to their registered email

Features Included

FeatureDescription
Enable/Disable MFA per UserAllows configuring MFA for individual accounts.
Email-based 6-digit OTPOTP is sent to the user's registered email ID.
Global OTP Expiry ConfigurationAdmin defines the OTP expiry duration.
UI-based Login VerificationOTP entry is required during login.

TaskNavigation Path
Enable MFA for UserLogin → User → Edit
Configure OTP TimeoutSetting → Global Setting
User Login with OTPLogout → Login Page → Enter OTP

Step-by-Step Process

Enabling Multi-Factor Authentication for a User

Follow these steps to activate MFA for the desired user account:

  • Go to Login > User.

  • Locate the specific user for whom to add Multi-Factor Authentication.

  • Click the Edit action button corresponding to the selected user.

    Figure image1: edit user image

  • On the user editing screen, scroll to the Multi Factor Authentication configuration section.

    • Two options are available: ‘Disable’ and ‘Enable’. Click on the Enable.
  • Click the Update button to save the global configuration.

    Figure image2: select mfa type image

  • A confirmation message, such as User account details has been updated successfully, will confirm the successful of the configuration change.

    Figure image3: success message display on screen


Configure Global OTP Timeout Setting

The MFA Email OTP Timeout setting defines the validity duration for the generated One-Time Password sent via email. This is a system-wide setting:

  • Navigate to Setting > Global Setting.

  • Locate the MFA Email OTP Timeout option.

  • Click the check box and enter the desired timeout duration in minutes.

    • Example: Entering 2 means the generated OTP will expire 2 minutes after it is sent. The user must enter and verify the OTP before this time limit.
  • Click on the Update button.

    Figure image4: global setting image

  • The system will display the confirmation message, Global config details has been update successfully.

    Figure image5: global setting success image


User Login with MFA

Once MFA is enabled for a user, the login process incorporates an additional OTP verification step:

  • The user must first Logout of any active session. The logout function is typically accessed via an icon or button in the platform's upper-right corner.

    Figure image6: logout image

  • On the platform's login page, the user enters their standard credentials (e.g., username and password) and clicks the SIGNIN button.

    Figure image7: credentials image

  • The system recognizes the MFA-enabled status and presents an Enter OTP prompt on the screen.

  • Concurrently, the system automatically dispatches a 6-digit OTP to the Email ID registered for that specific user account.

  • The user is required to retrieve the OTP from their registered email's inbox

  • The received 6-digit OTP is then entered into the designated field on the login screen.

  • The user then clicks on Verify OTP.

    Figure image8: verify Otp image

  • Successful verification of the OTP grants the user access to the platform, completing the secure login process.

    Figure image9: Dashboard login success


Important Notes for Users

  • Keep your registered email active and accessible:- OTP will always be sent to the email address linked with your account.
  • Do not share your OTP with anyone:- OTPs are confidential security codes meant only for the authorized user.
  • Enter the OTP within the configured expiry time:- If the OTP expires, you must restart the login process to receive a new one.
  • Check Spam / Promotions folders if OTP email is not visible:- Email filters may sometimes redirect system messages.
  • Ensure stable internet connectivity during login:- Slow or unstable internet may delay OTP delivery.
  • Use the latest browser version for best performance:- Outdated browsers may not support some security functions.
  • If you repeatedly do not receive OTP emails:- Contact your system administrator to verify your email configuration.
  • Logging out and logging in again may be required:- When MFA is newly enabled on your account.
  • Administrators may disable MFA only if required:- MFA improves security and prevents unauthorized account access.

FAQs

Q:1 What is Multi-Factor Authentication (MFA)?

MFA is a security mechanism that requires users to provide two or more forms of verification before accessing the system. In this platform, MFA combines the standard username-password login with a 6-digit OTP sent to the user’s registered email. This additional verification layer protects against unauthorized access even if login credentials are compromised.

Q:2 Can MFA be enabled for all users at once?

MFA can be enabled per user by editing individual accounts. Administrators cannot enable MFA for all users in a single bulk action through the interface. To enforce MFA system-wide, admins must configure each account separately or apply organizational policies that require MFA during account setup.

Q:3 How is the OTP delivered?

The OTP is a 6-digit code automatically generated by the system. It is delivered via email to the user’s registered email address associated with their account. The user retrieves the OTP from their inbox and enters it into the login screen to complete authentication.

Q:4 How long is the OTP valid?

The OTP validity is defined by the Global OTP Timeout setting configured by the administrator. Example: If the timeout is set to 2 minutes, the OTP will expire 2 minutes after being sent. Users must enter and verify the OTP within this time limit, otherwise a new OTP will need to be generated.