Current Status: This is currently being worked on.
Implement Two-Factor Authentication for Dashboard logins.
Hello all! We estimate about 5-6 weeks until completion of 2FA. It'll be implemented via TOTP so that you can use apps such as Authy and Google Authenticator.
For those of us who don't have SSO setup yet - any love with MFA yet - helping us prevent a major security breach?
Good day any update - Its Q4 now - Thx
Hey gents - just dropping in a comment here to keep this on your radar - we are pushing all of our vendors to enable 2fa. Thanks for any update on release timing you can provide.
My 2 cents: many partners are using Azure AD/Office 365 integration, so SAML option would cover that plus Cisco Duo can support SAML as well as others like OneLogin, Okta, etc. So that would be our preferred method.
2FA via TOTP (Think Authy, Google Authenticator, etc.) would be a nice option as well for partners/users that don't have SAML setup, and is a free/simple 2FA implementation.
Also, for visibility, making sure we can require all account users to use 2FA would be desired. At minimum, Owner/Admin accounts should see 2FA status on each user and whether it's setup or not.
Cisco Duo Integration would be great.
Would like to see SAML authentication, so we can use our preferred MFA service (Azure AD in our case).
@Jeff: SAML would be amazing for us too.
Looking forward to MFA - please make sure it works with standard authenticator apps like Google Authenticator and Authy. Would love it even more if you supported push notifications from Authy.
I'd like to add to this just a little. Yes, Dashboard logins nee 2FA. It should be considered an industry standard, especially in a service used for safety and security. I know for a fact 2FA can be implemented in minutes with Authy (Twilio), which I would recommend highly over Google Authenticator.
Additionally, when the "BYPASS" option is used, I think USERNAME/PASSWORD and 2FA should be used.