Two-factor authentication (2FA) is a security method that requires two different types of identity verification to grant access to the system. In the specific case where confirmation is carried out via email, after the usual username and password are entered, the user receives a temporary verification link at their registered email address. This method adds an extra layer of security.
The functionality of two-factor authentication (2FA) via email lies in its ability to enhance the security of user accounts. By requiring not only the usual password but also confirmation through a link sent to the user's email, this approach significantly reduces the risk of unauthorized access. An attacker would need to know the password and have access to the email registered to the account. Thus, 2FA via email provides an effective solution to protect sensitive information and maintain the integrity of online accounts.
To use two-factor authentication, we can configure it in the system parameters, global parameters, by groups, or in user registration.
We have a granularity level that applies the authentication configuration hierarchically; the configuration priority is USER → GROUP → SYSTEM.
- The application will first respect parameters applied at the User level, then at the Group level, and finally at the System level. Therefore, if two-factor authentication (2FA) via email is configured at the system parameter level, but the option "None" is selected at the group or user level, authentication will not be applied because group and user settings take precedence.
- The same applies in the opposite scenario, if 2FA via email is enabled for a user, but the option "None" is selected at the group or system level, the user will still have 2FA active.
To use 2FA, we need the system's email parameters to be correctly configured; otherwise, the user will not be able to receive the emails for authentication.
;smtp.office365.com); the client can choose their preferred server;We also need to configure 2FA to complete the settings. Therefore, we will choose to configure it through the system, groups, or users. Below is a description of each possible configuration option.
. A side panel will open;
. A side panel will open;Global groups are groups where we can manage features, object permissions, and global system parameters that are not associated with any application. Groups are named according to user needs. The system only creates the group object; the user must decide whether it will be global or application-specific and name it accordingly.
. A side panel will open;
to select the users to whom you want to apply 2FA;
;With the use of Two-Factor Authentication, on the T6 Enterprise login page, after entering the usual username and password, the user will receive a temporary verification link at their registered email address, which must be accessed to confirm identity and grant account access.
Using Two-Factor Authentication:
If you did not receive the email with the authentication link, click
;
A message will be displayed instructing the user to check the spam folder, contact the application administrator, or try resending the email. If you choose to resend, you will return to the previous screen;