Set Up Multi-Factor Authentication

Multi-Factor Authentication (MFA) provides an extra layer of security for users signing into TrueContext. When a user signs in with their username and password, TrueContext requests an additional authentication method to verify the user’s identity. This topic describes how to set up MFA for your team in TrueContext. It also describes how to turn off MFA, and how MFA pairs with Single Sign-On (SSO).

Tip:Currently, email authentication is the only MFA method available in TrueContext.

Available on all tiers:

Essentials
Advanced
Enterprise

Contents

Prerequisites

  • You must be an Admin user to set up MFA.

  • Complete a preparedness audit to ensure your team can use MFA successfully. To use MFA:

    • Every user on your team must have a valid email address associated with their account. To check this:

      1. Go to Users & Groups > Users > List Users.

        Result: The system displays a list of all users on your team.

      2. Hover over the arrow next to Users, and then select Export Users to CSV.

        Result: The system generates a CSV file that lists information about every user on your team.

      3. Update every user account that doesn’t have an email address. You can edit a user’s account information from their User Profile.

      Tip:If any users on your team do not have an email address and you try to set up MFA, a warning message displays. The message links to the same CSV report.

    • Field technicians must update to the latest version of the TrueContext Mobile App. MFA is not compatible with TrueContext versions earlier than 22.0.

    • Your organization must allow emails from TrueContext.

      Note:The system delivers authentication codes by email. If your team can’t receive emails from TrueContext, they won’t be able to sign in and start work.

      The authentication email comes from donotreply@truecontext.com. Ensure your email service does not block this address. Additionally, ask your team to add the address to their safe sender list and modify their inbox rules. Otherwise, the email service might mark authentication emails as spam or junk.

Steps to set up MFA

Once you set up MFA for your team, users must enter an authentication code to sign into TrueContext. If a user enters the correct username and password, TrueContext sends a 6-digit code to the user’s email address. The user must enter the code to sign into their account.

Tip:When you create a new team, MFA is enabled by default.

  1. Select your username > Team SettingsClosed The Team Settings page is the page where an admin can manage their team's account and edit certain information, such as assigning a Problem Contact Email Address, toggling push notifications, and viewing the account's billing information. >Security.

  2. Hover over the arrow next to Multi-Factor Authentication, and then select Enable.

    The Multi-Factor Authentication section on the Security tab. The cursor hovers over the arrow to reveal the option to enable MFA.

    Result: Users on your team must enter an authentication code to sign into TrueContext.

Info:When a new user creates their password from the Welcome email, the system signs them into the Web Portal without MFA. The next time they sign in, however, MFA applies and they must enter an authentication code.

Turn off MFA

  1. Select your username > Team Settings >Security.

  2. Hover over the arrow next to Multi-Factor Authentication, and then select Disable.

    Result: Users on your team can sign into TrueContext with their username and password. They don’t need to enter a code.

    The Multi-Factor Authentication section on the Security tab. The cursor hovers over the arrow to reveal the option to Disable MFA.

MFA and SSO

The MFA feature applies only to “native login”, where users enter their credentials directly into the Mobile App or Web Portal. TrueContext MFA does not affect Single Sign-On (SSO) that you set up outside of TrueContext.

Tip:Your organization can use both MFA and SSO within your TrueContext implementation. For example, you can set up employee users for SSO and third-party contractor users for MFA native login.