Overview
mgPass supports multi-factor authentication (MFA) using time-based one-time passwords (TOTP). Administrators can configure MFA policies globally or per-role.MFA Policy Modes
| Mode | Description |
|---|---|
off | MFA is disabled for all users |
optional | Users can opt in to MFA from the account portal |
enforced | All users must set up MFA on next login |
TOTP Setup Flow
Initiate setup
The user initiates MFA setup from the account portal. mgPass generates a TOTP secret and returns a QR code URI.
Scan QR code
The user scans the QR code with an authenticator app (Google Authenticator, Authy, 1Password, etc.).
Recovery Codes
Recovery codes are 10 single-use codes generated when MFA is first enabled. They provide account recovery if the user loses access to their authenticator app.- 10 codes generated at MFA setup
- Each code is 8 characters, alphanumeric
- Each code can only be used once
- Users can regenerate all codes (invalidating previous ones)
Per-Role MFA Enforcement
Enforce MFA for specific roles regardless of the global policy:mfa_required: true is assigned to a user who has not set up MFA, they will be prompted to configure it on their next login.
Admin Operations
Disable MFA for a User
If a user is locked out, an admin can disable MFA on their account:Check MFA Status
mfa_enabled: true|false indicating whether MFA is configured.
