LogoLogo
Home
  • ExaVault Documentation
  • Installing & Upgrading The Appliance
    • Downloading The Base Image
    • System Requirements
    • Firewall Configuration
    • Installation & Setup
      • AWS Installation
      • VMWare Prerequisites
      • Installing Other Software
    • Mounting the Data Drive
    • Upgrading to v18.x from v16.10
      • VMWare Upgrade Prerequisites
    • Upgrading From 16.05 or Earlier
  • Using ExaVault
    • Users
      • SSH Key Authentication
        • Creating an SSH Key on Windows
        • Creating an SSH Key on Linux
        • Creating an SSH Key on macOS
      • Export List of Users and Groups
      • Two-Factor Authentication (2FA)
      • Single Sign On (SSO), SAML, SCIM
    • Links (Share Links)
    • Notifications
    • Ciphers
    • Customizing Your Site
      • Login Page
      • Contact Information
      • Custom CSS
      • Custom Terms of Use Agreement
  • Connection Methods
    • SFTP
      • Supported SSH Ciphers
      • Maximizing SFTP Performance
      • Command Line SFTP Examples
      • Troubleshooting SFTP
    • FTP and FTPS
      • Troubleshooting FTP
    • WebDAV
  • Administration Tasks
    • Restarting the Appliance
    • Logging
    • License Keys
    • Installing or Updating SSL Certificate
    • Increasing Available Storage
    • Deleting Old Activity
    • Deleting Old Quotas
    • Appliance Manager Password Reset
    • Sending Email
  • Premium Features
  • Migrating to Files.com Cloud
    • Migration Process Overview
    • Technical Enablement Steps
    • Regional Considerations
  • HyperPrivacy Mode
    • User Home Folders
    • User Deletions
    • Sharing
    • Retention Rules
    • Trash Can
Powered by GitBook

©2023 Orange Platform LLC dba ExaVault. All rights reserved.

On this page
  • Who Can Use 2FA
  • Is 2FA Required?
  • Supported 2FA Methods
  • Authenticator Apps
  • SMS (Text messages)
  • Email Verification
  1. Using ExaVault
  2. Users

Two-Factor Authentication (2FA)

Two-factor authentication (2FA) is a security feature that adds an extra layer of protection to user accounts. As a form of multi-factor authentication, it requires users to provide two different types of credentials to log in:

  1. Something they know – typically their password

  2. Something they have – such as a smartphone, email account, or an authenticator app

Enabling 2FA is one of the most effective ways to protect your data and reduce the risk of unauthorized access to your ExaVault account.

When enabled, two-factor authentication applies to logins to the web interface. After entering their username and password, users will be prompted to provide a second verification method—depending on their chosen 2FA setup.

Who Can Use 2FA

Any user who is able to set their own password can also configure 2FA from their User Profile. Each user manages their own 2FA setup; neither administrators nor other users have access to view or modify another user's 2FA configuration.

This ensures that 2FA credentials remain private and secure, even from administrators.

Is 2FA Required?

2FA is optional. If your organization requires 2FA for compliance or internal security policies, each user must manually enable and configure 2FA for their own account.

At this time, there is no enforced requirement feature to mandate 2FA across all users—though that can be encouraged through policy or onboarding workflows.

Supported 2FA Methods

ExaVault offers 3 methods your users can choose from to meet their needs.

Authenticator Apps

These include apps that use TOTP (time based one-time password) such as Google Authenticator, Duo, and Authy. Authenticator apps are typically installed and used on mobile devices.

If you've lost access to your authenticator app, you can receive a backup code via email during the login process.

SMS (Text messages)

This method is considered less secure than using an authenticator app but still offers greater security than password alone.

If you've lost access to your phone, you can receive a backup code via email during the login process.

Email Verification

With this method, the user must supply a code sent to them via email each time they attempt to connect. Just like SMS, receiving a 2FA code with email is less secure than other options, but still better than relying on a password alone.

PreviousExport List of Users and GroupsNextSingle Sign On (SSO), SAML, SCIM

Last updated 1 month ago