Multi Factor Authentication (MFA)
End User Guide

MFA End User Guide

To create an MFA user you need to register a https://super.oplon.cloud/2fa/signup (opens in a new tab).

Registration

  1. Then insert username, email and password that respects the constraints.

  2. Enter the code sent by email and then verify the email.

💡

The Oplon 2FA app can also be registered at a later time by accessing the MFA dashboard via email.

  1. App registration Oplon 2FA (optional from point 3 to 5): if you want to proceed then download the application and click on the check button in the browser.

  2. After and only after having pressed verify in the browser in the previous step, enter the credentials in the app and click register.

  3. To conclude the app registration procedure, enter in the application the first code (visible via browser), the second (sent via email) and click verify.

MFA Dashboard

Dashboard legend:

  1. Username
  2. Email
  3. Change and verify the email
  4. Change user description
  5. Change password
  6. Change authenticator app and secret
  7. LEGACY: change 2FA app to register and verify a new app (and de-register the previous one if it exists)
  8. List of domains to which the user has access
  9. User activity log
  10. Permission request Pending
  11. Permission request Granted
  12. Permission request Denied

Login and permission request

To request a permit, simply visit the MFA-protected resource you want access to. The resource will redirect you to https://super.oplon.cloud/2fa/login (opens in a new tab).

After entering the username and password, we will proceed to the second authentication factor (app or email).

App:

E-mail:

In the dashboard, therefore, there will be an alert to request permission from the manager:

By clicking request permission, the manager will be asked for permission. As soon as the manager accepts the permission, the user will be notified by email.

Login with permission already accepted

After the manager has accepted the permission, the resource can be accessed simply visiting the MFA-protected resource and logging in with double-factor authentication.