MultiFactor Authentication (MFA)

Enrollment

Estimated reading: 2 minutes 975 views

Enrollment in MFA refers to the initial process of registering a user for Multi-Factor Authentication. During this process, the user sets up one or more authentication methods, such as receiving one-time passwords (OTPs), linking a mobile authenticator app (like Microsoft Authenticator). This ensures the user can securely verify their identity using multiple factors beyond just a password.

In Visual Guard we have 3 enrollment ways:

Enroll via your Email ID

In Visual Guard, MFA via email uses a one-time password (OTP) or a secure verification link sent to the user’s registered email address as an additional layer of authentication. This method is simple to implement and leverages an existing communication channel, making it easy for users to adopt without any extra setup.

By requiring access to the registered email account, it helps prevent unauthorized access even if user credentials are compromised. This approach is particularly useful for securing sensitive actions and transactions while maintaining a smooth user experience.

Enroll via your Mobile Number

In Visual Guard, MFA via mobile number allows users to verify their identity using their registered mobile number. During authentication, users can receive either a one-time password (OTP) or a verification link via SMS on their mobile device.

This method adds a reliable second layer of security by ensuring that only users with access to the registered mobile number can complete the authentication process. It is widely used and trusted, making it a practical option for organizations looking to enhance security without adding complexity for users.

Enroll via Microsoft Authenticator

In Visual Guard, MFA via Microsoft Authenticator uses time-based one-time passwords (TOTP) generated within the authentication app. Once configured, the app continuously generates secure codes that refresh at regular intervals.

During login, users enter the current code from the app to verify their identity. Since the code is time-sensitive and generated on the user’s device, this method provides a more secure and controlled form of authentication, making it well-suited for environments with higher security requirements.