Two-Factor Authentication (2FA) |
Scroll |
In Therefore⢠it is possible to enable two-factor authentication (2FA) for all users. This will force every user to confirm their log in via e-mail. 2FA configuration is done in the Therefore⢠Solution Designer. The configuration dialog can be accessed by either right-clicking the Authentication node and clicking Configure, or through the Advanced Settings, under Security. This 2FA configuration applies only to internal users and will not affect any 2FA configuration for external accounts or domains such as Entra ID or Okta.
2FA is also available for Portal users. Its configuration can be found by right-clicking the Portal node in the Therefore⢠Solution Designer, selecting 'Manage categories' and then '2FA Configuration'.
In order to enable 2FA it is required to have the new web client installed on the system. This means XMLServer and Web API will need to be installed. |
Force 2FA for all users (checkbox)
Checking this will force every user to confirm each of their log ins via e-mail.
E-mail template
Select which of the e-mail templates you wish to configure.
Confirmation
This is the e-mail that is sent to users each log in and is used as the second factor.
Password change confirmation
This is the e-mail that is sent to a user confirming their password change.
Use system default template (checkbox)
Check this to use the system default template for the current email being configured. By un-checking it, it is possible to press Configure.
Configure
Opens the e-mail configuration wizard. The subject and the body of the e-mail can be configured here. Clicking the Macro button will open a dialog with the macros available for the type of e-mail being configured.
Note: Two-factor authentication is currently supported by Microsoft Entra ID, Okta and OneLogin. Configuring this for any of these platforms must be done directly with their provider and not Thereforeā¢. |