Skip to content

Multi-Factor Authentication (MFA)

Overview

To enhance the security of the Mber+ admin portal, Multi-Factor Authentication (MFA) is now enabled for all admin users. This feature requires admin users to verify their identity using a one-time passcode generated by an authenticator app, in addition to their standard login credentials.

MFA setup is mandatory for admin users and uses a Time-based One-Time Password (TOTP) mechanism via Google Authenticator or Microsoft Authenticator.


Prerequisites

  • You must have Google Authenticator or Microsoft Authenticator installed on your mobile device.
  • You must complete the MFA setup before accessing the admin portal if it has not been configured previously.

Setup Steps (First-Time Users)

  1. Login with your username and password as usual.
  2. You will be redirected to the MFA Setup screen.
  3. Open your preferred Authenticator app (Google or Microsoft).
  4. Scan the QR code displayed on the setup screen or enter the manual key provided.
  5. Enter the 6-digit code generated by the app to verify your setup.
  6. Optionally check “Remember this device for 30 days” if you do not want to be prompted again from the current device.
  7. Upon successful verification, MFA will be enabled and required for future logins.


Note: If you do not complete the setup, you will not be able to access the admin portal.


MFA Setup

MFA Setup 2 - Verification


Remember This Device (30 Days)

  • You can opt to trust your current device for 30 days.
  • If enabled, you won’t be prompted for MFA on this device for 30 days.
  • After 30 days, you will be prompted again.
  • Trusted devices can be revoked by other administrators.

MFA Verification - Trusted Device


Resetting MFA

  • Admin users can reset MFA setup.
  • When MFA is reset:

  • The admin user will be required to set up MFA again on next login.

  • All trusted devices will be cleared.
  • The TwoFactorEnabled flag remains true, but setup is marked as incomplete.

Backend Setup

  • MFA setups can be found under menu Users -> User List -> Add / Edit User.

MFA Admin Configure


Role-Based Control

Role Permission
Super Admin Can enable/disable MFA for other admins
Admin (TPF / Client) Must complete setup if MFA is enabled for them
Admin (TPF / Client) Can reset MFA setups

Troubleshooting

  • Authenticator app not generating code? Ensure your phone’s time is set automatically.
  • Lost your device? Contact your Super Admin to request an MFA reset.
  • Changed your phone? You will need to reset MFA and scan the new QR code.

Security Notes

  • Authenticator keys are securely stored and never shared.
  • Trusted devices are device-specific and expire automatically after 30 days.
  • MFA setup and verification logs may be audited for compliance.

FAQs

Q: Can I disable MFA for my account?

A: No. MFA is enforced for all admin users by system policy.

Q: What if I delete my authenticator app?

A: Request an MFA reset from a TPF Admin or Client Admin users.

Q: How do I know if my device is trusted?

A: Trusted devices do not prompt for MFA. You can revoke them in the User's settings if available.