Enforce 2-factor authentication for all users

Enforce 2-factor authentication for all users

Enforce two-factor authentication

When a user is created, a 2-factor authentication for the login is forced. Without the assignment of a 2-FA method, the user cannot be created. If you want the SMS pass code method to be used for users, you must first purchase this.   The 2-factor authentication settings are available to you, but are optional to apply.
If you have chosen this method, the user must enter an SMS passcode once, which will be sent to him during registration. If the license is reassigned, the user will have to register again, where a passcode will be requested again.

Two-factor authentication when inviting new users


Proceed as follows:

  1. Open the "Administration".
  2. Open the 3-dot menu in the toolbar.
  3. Select the "Enterprise settings"
  4. Open the "Access protection" tap.
  5. Scroll down to " 2FA Enforcements".
  6. If desired, activate the "2-factor authentication when inviting new users" function via the checkbox. 
  7. Save your setting.


Two-factor authentication at login
When a user is created, a 2-factor authentication for the login is forced. Without the assignment of a 2-FA method, the user cannot be created. If you want the SMS pass code method to be used for users, you must first purchase this.  The 2-factor authentication settings are available to you, but are optional to apply.
    


Proceed as follows:
  1. Open the "Administration".
  2. Open the 3-dot menu in the toolbar.
  3. Select the "Enterprise settings" 
  4. Open the tap "Access protection" .
  5. Scroll down to 2FA Enforcements".
  6. If desired, activate the "Enforce 2-factor authentication for user login" function via the checkbox. 
  7. Save your setting.
 

This article did not answer your question?

We are happy to help you! Just send us a message with your questions and we will get back to you as soon as possible.   


        Create ticket



Disclaimer
The content of this online help is intended solely for information and documentation purposes for our product idgard® and can be changed at any time without prior notice. We assume no responsibility or liability for errors or inaccuracies. Due to technical developments, uniscon GmbH reserves the right to change the functional scope of the product at any time.

(C) uniscon GmbH

    • Recent Articles

    • Data room archive

      In some professions it is necessary to archive documents. For this purpose, you can create a data room archive with idgard. Attention: The license is then permanently blocked and must be paid for until the end of the entire contract period! ...
    • Delete multiple users at the same time

      In the user administration, you can delete multiple user accounts at the same time using batch actions. Which users you can delete depends on your own permissions and on the permissions of the users whose user accounts you would like to delete. To ...
    • Change the user status for multiple users at the same time

      In the user administration, you can deactivate multiple activated user accounts or reactivate multiple deactivated user accounts at the same time. Regardless of which users you select, the batch options are only performed for those users for whom ...
    • Manage permissions for multiple users at the same time

      In the user administration, you can change permissions for multiple users at the same time. Which permissions you can grant or modify depends on your own permissions and on the permissions of the users whose user accounts you would like to edit. To ...
    • Modify user groups and notifications

      You can assign multiple users to the same user groups in the user administration. You can also edit the notification settings for multiple users at the same time. To assign multiple users to the same user groups at the same time, proceed as follows: ...
    • Related Articles

    • 2-Factor authentication default settings

      2-Factor authentication settings To increase the protection factor, you can force the use of a 2-FA in idgard®. Changes at this point are only effective for newly created users. To make this setting, you need the permission of an Administrator. The ...
    • Create new users

      You can create new users in the user administration via the Create User function. This function is available in the top bar. When you select one or several users in the user overview, the available batch actions are shown in the top bar. To create ...
    • Use case: create new users

      The following use case illustrates how users are created in this particular case. The following conditions apply to User A: ● User A should be grated a full license. ● User A shall have permissions to create temporary Boxes and shall be able to share ...
    • Logging in to idgard® using the TOTP password (two-factor authentication)

      Logging in to idgard® using the T-OTP (time-based one-time Password) Sensitive data requires a higher level of protection. An authentication app must be installed before the TOTP process can be used. After setting up TOTP, the user must enter a ...
    • Set session timeout for all users

      Set session timeout for all users A short expiration period is useful to avoid that unauthorized persons can take over user sessions. Long timeouts should only be accepted when using the service in trusted environments. Without this default setting, ...
    • Popular Articles

    • Uploading files

      Uploading files You can upload one or more files up to a size of 5 GB. For a fee, we can increase the size limit of 5 GB for you. You can only upload files with the "Write" permission. There are two methods with which you can upload files to a box. ...
    • Folder upload - behaviors and limitations

      Unsupported characters in file names will be replaced by an underscore during the upload process, this applies to these characters: *, /, \, ?, :, <, >, ^, ", &, | Example: M&A_Overview.xlsx will be renamed to: M_A_Overview.xlsx File names that ...
    • View box activities in the journal

      In data rooms and depending on the setting, certain activities can be registered in a journal. You can view the data room journal if you have the permission to do so. To view box activities in the journal: 1. Open the data room the journal of which ...
    • Welcome to the idgard® online help

      Welcome to the idgard® online help This online help is the main source of information for learning and working with idgard®. Click on one of the following links to obtain further information about idgard®. To use the online help: Search article Enter ...
    • Isn't encryption on the device the best bet for a safe cloud?

      Isn't encryption on the device the best bet for a safe cloud? The term „cloud computing“ encompasses two aspects: Data storage in a cloud for one’s self, excluding multiple or third-party access. Data processing or storage of information in a cloud, ...