Need Help? We are right here!
Thanks for your Enquiry. Our team will soon reach out to you.
If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com
Search Results:
×MFA is an identity verification method to secure users, identities, and accounts. Generally, you use your username and password to authenticate your accounts.
However, when you add something unique you have your phone or fingerprint to the equation, the added layer enhances security and avoids any security compromise.
Your access becomes more secure and impossible for an attacker to pass it even if they have your password, by combining your username and password with the second method.
| OTP Over Email | You receive an OTP on your registered email address which is used for 2nd Factor Authentication.
Note: You will have to configure your Email Gateway before using this method to send emails. |
| OTP Over SMS | You receive an OTP on your registered phone number as a means for 2nd Factor Authentication.
Note: You will have to configure your SMS Gateway before using this method to send SMS to users |
| OTP Over Email & SMS | You receive an OTP on both your registered email and phone no. which is used for 2nd Factor Authentication.
Notes: You will have to configure your Email Gateway before using this method to send emails. Moreover, admins have to configure your SMS Gateway before using this method to send SMS to users |
| Email Link (Out of Band Email) | You receive an email that contains two links that either allow or deny authentication. You can click on the allow the link to complete the authentication or the deny link to cancel the authentication. Note: Your IDP deployment should be accessible over the internet for the authentication to work. |
| SMS Email (Out of Band SMS) | You receive an SMS that contains two links that either allow or deny authentication. You can click on the allow link to complete the authentication or the deny link to cancel the authentication. Note: Your IDP deployment should be accessible over the internet for the authentication to work. |
| Security Questions (KBA) | In KBA, users set 3 questions and their respective answers from their accounts. When they are authenticating themselves, they have to answer 2 out of 3 set questions.
Note: The user has to configure the questions along with their answers prior to using this MFA method. |
| Phone Verification | the user receives a call telling a 4-8 digit numeric key which is used for the 2nd Factor Authentication.
Note: You will have to configure your own Phone Gateway to use this method. |
miniOrange Authenticator Methods:
|
Notes
|
| Google Authenticator | The users need to enter the 6-digit OTP shown in the Google Authenticator App. The OTP keeps changing every 30 seconds.
Note: The users will have to install the Google Authenticator App on their phones and configure it with their miniOrange account prior to using it as a 2FA method. |
| Microsoft Authenticator | The users need to enter the 6-digit OTP shown in the Microsoft Authenticator App. The OTP keeps changing every 30 seconds.
Note: The users will have to install the Microsoft Authenticator App on their phones and configure it with their miniOrange account before using it as a 2FA method. |
| Authy Authenticator | The users need to enter the 6-digit OTP shown in the Authy Authenticator App. The OTP keeps changing every 30 seconds.
Note: The users will have to install the Authy Authenticator App on their phones and configure it with their miniOrange account before using it as a 2FA method. |
| YubiKey Hardware Token | "YubiKey hardware Token" is a 2FA verification method, in which a user needs to connect a USB to his computer which generates a token in the form of an alphabetic key. This process works with a combination of OTP & hardware tokens.
Note: The user has to configure the hardware token from the end user dashboard before using this MFA method. |
| Display Hardware Token | "Display Hardware Token" is a 2fa verification method, in which a user needs to connect a USB to his computer which generates a token in the form of a Numeric key. Note: You need to assign a hardware token to users before enabling this 2FA method. |
| Biometric (FIDO2/Passkey) | In this method, the users need to use built-in authentication methods (Windows Hello, inbuilt fingerprint, Biometrics (Face ID or fingerprint)), and Hardware Security Tokens (eg. Yubikey FIDO2 Token) for 2FA verification.
Note
|
| Grid Pattern | In this method, users define a pattern by selecting specific locations on a grid during the setup process. To log in, the user must replicate the same sequence of grid selections in the correct order to successfully verify their identity. |
| RSA MFA | In this method, users authenticate via RSA SecurID by entering a tokencode or responding to a push notification. To log in, the user must provide the correct RSA verification to successfully verify their identity. |
From the above 2FA options, you can set up any of the methods.