Multi-Factor Authentication (MFA)
MFA adds a second verification step after password login, significantly reducing the risk of account compromise from stolen credentials.
epilot supports TOTP (time-based one-time password) via authenticator apps such as Google Authenticator, Authy, or 1Password, as well as SMS-based MFA.
tip
How It Works​
- A user logs in with their email and password via AWS Cognito.
- Cognito challenges the user for a TOTP or SMS code.
- The user enters the code from their authenticator app or SMS.
- On successful verification, Cognito issues OAuth 2.0 tokens.
Enabling MFA for Your Organisation​
Organisation administrators can enable MFA from Organisation Settings > Security in the epilot 360 portal.
Two modes are available:
- Optional -- individual users choose whether to enable MFA on their account.
- Required -- all users in the organisation must set up MFA on their next login.
User Setup​
When MFA is enabled, users are prompted to configure it on their next login:
- Open an authenticator app on your mobile device.
- Scan the QR code displayed on the epilot login screen.
- Enter the 6-digit code from the app to confirm setup.
- On all future logins, you will be prompted for a TOTP code after entering your password.
The MFA status of each user is tracked via the mfa_enabled field on the User API.
MFA on Customer Portals​
Customer portals support an advanced MFA mode that sends a login code and magic link to the user's email after password entry. Portal administrators can enable this in portal settings under Security > Multi-factor Authentication.
Configuration via API​
- User MFA status:
mfa_enabledfield on the User API - Organisation settings: Organization API
See Also​
- Passwordless Login -- sign-in links without passwords
- Passkeys -- phishing-resistant biometric and hardware key authentication
- SSO -- federated login with OIDC and SAML
- Authentication -- OAuth 2.0 login flow