Reference Guide
Multi-Factor Authentication
Using MFA to Log in to the Single Connect Web GUI
mfa can be used to add another security level to the single connect log in after the user enters their single connect log in credentials, the system will ask for a one time password (otp), that will be generated by the mobile app to activate one time password (otp) for the single connect gui log in pre requisite all users, including the admin, have a qr code, installed the single connect mobile app, scanned the qr code with the mobile app, and otp is enabled at least for the user group mfa also needs to be configured for the admin, by creating and sending a qr code, so that the admin can sync their single connect and their single connect mobile app after enabling mfa, the admin will also need to use it to log in to the system if mfa has not been configured for the admin, the admin will not be able to log in (if the admin gets locked out, please contact the single connect support team) one of the user groups needs to have otp enabled (check section to https //app archbee com/docs/jsymind0w sxaymlkgomr/jue7jvwwhhj0z8r4o67nr if there is no user group enabled for otp, mfa will not work if just one or more user groups are enabled for otp, mfa will be enabled for all the users for single connect log ins) navigate to administration > system config man set the required parameters sc portal otp enabled=true (one time password enabled for gui login) otp rest url= http //127 0 0 1 (if ssl is enabled in network, the url should be https //127 0 0 1 ) log out and log in again after the login screen, single connect asks for an offline token open the single connect mobile app, select offline token and enter the token value to log in