Two-factor authentication

Each user can use two-factor authentication in addition to the password to increase security. On this page, you can configure one or more security keys, even several of the same type. As soon as a key exists, two-factor authentication is activated. From then on you will need the one-time password of one of these keys to log in to the program and to manage your security keys. By default, two-factor authentication is also used to sign orders and payments. You can switch off this use in your personal user preferences.

The overview shows which keys you have set up. The key type and an ID (serial number, identifier, account or user name) are defined during configuration and cannot be changed.

New Yubikey / New Authenticator app / New web authentication key

If you want to use a hardware security key, you can choose between the following methods: Yubikey and Web authentication key. For method Authenticator app, an app must be installed on a mobile device that is permanently available. Clicking on one of the buttons loads a page on which you can set up the respective key.

Edit description

A description, max. 255 characters, is an optional entry to distinguish between several security keys or to explain use. The description can be entered when you create the security key. It can be subsequently added or changed. To edit, select a line and use the button to open a dialog box for entering the description.

Delete

You can select and delete security keys individually. This opens a page on which you must enter the one-time password of the key to be deleted or another key for confirmation. If you want to deactivate two-factor authentication, you must delete all the keys you have configured.

Note: Administrators and managers can perform the actions Delete and Edit description for the security keys of other users. There is a button for this on the page User administration – Edit user.
Assistance by an administrator/manager may be necessary if the hardware device you have configured or the authenticator app are no longer available and you can no longer log in. To prevent this situation, it is advisable to configure a second security key as a backup.

Figure: Managing the two-factor authentication