Multi-Factor Authentication

Multi-Factor Authentication (MFA), also known as Two-Factor Authentication (2FA) or Two-Step Verification, enhances security by requiring multiple forms of verification to access Brand Toolbox.

By default, MFA is disabled but can be activated upon request and integrated with your site.

As a frontend user accessing the site, two steps are required to successfully complete Multi-Factor Authentication:

Having trouble with Multi-Factor Authentication?

Step 1: Register an MFA Authenticator

Logging in via MFA requires the user to first register an MFA Authenticator, such as the Microsoft Authenticator or Google Authenticator apps.

These apps are available to download and install on your mobile device, from the App Store or Google Play.

Microsoft Authenticator app

Google Authenticator app

Once the app is installed on your device, you can proceed to register^ it with Brand Toobox.

^ Note that you only need to register with an Authenticator app once. Once registered, each subsequent login requires verification of the one-time password code only (see ‘Step 2’ below).

To register an MFA Authenticator:

Multi-Factor Authentication Registration

To proceed, you are required to register an MFA Authenticator to secure your account. On your mobile device, download and install the Google Authenticator or Microsoft Authenticator app from the App Store or Google Play, and scan the QR Code below:

Qr Code Sample Only

Enter Code Continue

Microsoft Authenticator app screen

Microsoft Authenticator registration
 
 
Google Authenticator app screen

Google Authenticator registration
 

Well done — you’ve successfully registered and logged in with MFA.
 

Step 2: Ongoing MFA verification

Each subsequent login to Brand Toolbox requires you to verify the ‘one-time password code’ displayed in your Microsoft Authenticator or Google Authenticator app.

After successfully entering your username and password on the Brand Toolbox login screen, the following screen will appear:

Multi-Factor Authentication

To proceed, enter the ‘one-time password code’ displayed on your authenticator device (Google Authenticator or Microsoft Authenticator):

Enter Code Continue

To retrieve the code, open the Authenticator app on your mobile device, and:

Microsoft Authenticator app screen

Microsoft Authenticator verification
 

Google Authenticator app screen

Google Authenticator verification
 

You’ve now successfully verified and logged in with MFA.
 

Troubleshooting

Having trouble with Multi-Factor Authentication?

This section covers common problems users experience when setting up or using MFA, along with step-by-step solutions to help you get back on track quickly.
 

Common MFA Issues:

1. Lost or Unavailable Device

Issue: You no longer have access to the device used for MFA.

Steps to resolve (member):

Steps to resolve (administrator):

2. Authenticator App Problems

Issue: The app is not working, missing, or generating invalid codes.

Steps to resolve (member):

Steps to resolve (administrator):

3. Time Sync Issues

Issue: Codes from the authenticator app are not accepted.

Steps to resolve (member):

4. Multiple Accounts or Devices Confusion

Issue: You have multiple accounts in one authenticator app or are using a different device.

Steps to resolve (member):

5. MFA Locked Out or Too Many Attempts

Issue: Multiple failed attempts triggered a temporary lockout.

Steps to resolve (member):

Steps to resolve (administrator):

Developer notes only

MFA is currently only available for frontend ‘member’ access.

To enable, key="mfa:enabled" must be set to "true" in the web.config :

<add key="mfa:enabled" value="true" />

The key="mfa:organisation" value is the name that will appear on the MFA Authenticator app. A customer name MUST be added to differentiate MFA accounts:

<add key="mfa:organisation" value="CustomerName Brand Toolbox" />
 

MFA help tooltip

An MFA help icon can be placed next to the MFA apparatus on the login page (with help text and links to the User Guide).

Tooltip settings and text can be configured here:
Content [section] > Settings [node] > Membership [tab]:

A note about MFA and member registration

When new members first register, there are two MFA pathways for non-SSO accounts:

  1. External Suppliers usually go through an approval process. After approval from the Access Administrator, and on first login, the MFA registration process is initiated.
  2. Employees DO NOT usually go through an approval process, as only email validation is required. Therefore, after verification the member is logged straight in, and the MFA process isn’t initiated. However, when logging out and back in again (and on every subsequent login), the MFA apparatus is activated.

 

Free
demo