The Meridix Platform Dstny Analytics platform support two-factor authentication through the default methods e-mail (SMTP) and OTP (Authenticator apps such as Microsoft Authenticator or Google Authenticator). Additionally, SMS (twilio (SMS SaaS vendor)), and SMPP (smpp) methods are supported options.
The configuration is done through the standard property provider system. The 2FA can be configured on system-, reseller-, or customer level but not on the user level.
The system can and should have at least two providers set (not required). To disable 2FA completely, do not set any providers at all.
Property key | Valid values (bold=default) | Description | ||
---|---|---|---|---|
security.two_factor_authentication_required | true | false | Should the system enforce two factor authentication on system/reseller/customer level. False means all the users can set up 2 factor authentication optionally from My account. | ||
security.two_factor_authentication_scope | none | all| admin | system | system-admin | For who should the system enforce two factor authentication. | ||
security.two_factor_authentication_provider_types | email|otp|twilio|smpp | The enabled two factor authentication provider types delimited by |. Options:
| ||
security.two_factor_authentication_valid_for_minutes | -1 | integer | The time between two factor authentication requests. I.e. if the user have previously logged in the within the last X minutes the 2fa step is skipped. |
Configuration example using basic.config
This is a configuration example for applying 2FA on system level. The code is applied in the app settings part of the basic.config file residing in the Meridix Platform (studio) installation folder.
The example below will leave 2FA with email or OTP as optional for all users below system administrators, and enforced for system administrators. There will be a grace period of two hours from login with 2FA until it is needed again, unless the user actively logs out from Meridix Platform. In that case 2FA would be needed to log in again.
Code Block | ||
---|---|---|
| ||
<!-- The two factor authentication provider type. Options: twilio (SMS), email (SMTP) --> <add key="security.two_factor_authentication_provider_types" value="email|otp" /> <!-- Should the system enforce two factor authentication --> <add key="security.two_factor_authentication_required" value="true" /> <!-- For who should the system enforce two factor authentication. Options: all | admin | system | system-admin --> <add key="security.two_factor_authentication_scope" value="system-admin" /> <!-- The time between two factor authentication requests. I.e. if the user have previously logged in the within the last X minutes the 2fa step is skipped. -1 will force 2fa on every login --> <add key="security.two_factor_authentication_valid_for_minutes" value="120" /> |
Providers
twilio
A provider for sending SMS using Twilio. Requires an account in twilio that will be used. The required properties for the twilio provider is listed below.
...
Code Block | ||
---|---|---|
| ||
<add key="twilio.account_sid" value="AC089df37bc21bd4f6d************"/> <add key="twilio.from_number" value="+12183*******"/> <add key="twilio.token" value="3781c88e7e1989a799********"/> |
A provider for sending E-mails using the standard SMTP service in Meridix. No additional properties needed other than the standard SMTP configuration.
smpp
A provider for sending SMS using an SMPP server (needs to be provided by the customer). The required properties for the smpp provider is listed below.
...
To configure the SMPP in general, we need the host IP, password, port, and source phone number.
Frequently asked questions
Q: For how long is the 2FA code valid?
A: 5 minutes
Q: How many failed attempts are allowed and what happens after that?
A: After three failed attempts, the user is redirected to the login page , and needs to provide their password again.