Two-Factor Authentication (2FA) in Action

Introduction

Two-Factor Authentication (2FA) significantly enhances the security of your Endpoint Cloud account by requiring an additional verification step beyond your password.

This page explains what you can expect once 2FA is enabled, including the login experience, how sensitive operations are secured, and how to manage your trusted devices. We'll provide practical examples, such as deleting a team, to illustrate how 2FA functions during sensitive actions, ensuring you're always prepared and confident when using Endpoint Cloud.

Logging in with 2FA

When logging into Endpoint Cloud after enabling Two-Factor Authentication (2FA):

  1. Log In with your Username and Password
    Enter your standard login credentials and click LOG IN. Login.png

  2. Enter your Verification Code (OTP)
    After entering your credentials, you'll be prompted to provide your One-Time Passcode (OTP) generated by your authenticator app.

  3. Set a Trusted Device
    If you're logging in from a trusted device, select the checkbox "Remember this device for 30 days". This step allows you to skip entering an OTP when logging in from this same device for the next 30 days. Trust Device.png

    Information

    If you do not have access to your phone or authenticator app, select the "Try another way" option.

    This alternative method will send your OTP verification code directly to your registered email address, allowing you to securely log in even if your primary authentication method is temporarily unavailable.

  4. Click CONFIRM CODE after entering the OTP to access your account.

Performing Sensitive Actions with 2FA

With Two-Factor Authentication (2FA) enabled, certain sensitive actions within Endpoint Cloud, such as deleting a team, will require additional verification for enhanced security.

Example: Deleting a Team

When you attempt to perform a sensitive action like deleting a team, you'll see a security prompt confirming your intent. To proceed:

  1. Carefully read the warning message that explains the implications of your action.
  2. Open your authenticator app to obtain a verification code.
  3. Enter this code in the provided fields.
  4. Click DELETE to complete the action.

This additional layer of security ensures that only authorized users can perform critical operations within Endpoint Cloud.

Refer to the image below for an example of the 2FA prompt when deleting a team.Delete Team OTP.png

Reviewing Trusted Devices

After enabling Two-Factor Authentication (2FA), you have the ability to manage and monitor trusted devices that you've previously approved. These devices can access Endpoint Cloud without needing to re-enter the OTP verification for 30 days from their last approval.

To review your trusted devices:

  1. Navigate to your My Settings page by clicking on your Profile menu located in the top-right corner of your Endpoint Cloud interface.
  2. Navigate to the Trusted 2FA Devices in the 2-Factor Authentication section to see a list detailing:
    • DEVICE – Operating system (e.g., Windows 10/11).
    • CLIENT – Browser used during authentication (e.g., Firefox, Edge, Chrome).
    • IP ADDRESS – Last known IP address from which the device accessed Endpoint Cloud.
    • LAST LOGIN – The most recent time the device was used to log in.

You can manage your security by regularly reviewing this list, and if needed, remove any devices you no longer trust or recognize.

Refer to the image above for an example of managing trusted devices.2FA Trusted Devices.png

Removing a Trusted Device

You can remove previously trusted devices if they're no longer in use, lost, or if you suspect unauthorized access. Once removed, these devices will again require a 2FA verification code at login.

Steps to remove a trusted device:

  1. Navigate to the My Settings page from your profile menu.
  2. Under the Trusted 2FA Devices list, locate the device you wish to remove.
  3. Click on the Remove icon next to the device. Delete Trusted Device.png
  4. Confirm the action by clicking the PROCEED button in the confirmation dialog.Remove Trusted Device.png
Note

After the removal of a trusted device, the device will require a 2FA OTP verification at the next login attempt.

You now understand how Two-Factor Authentication (2FA) protects your account during login and sensitive actions, and how you can manage your trusted devices within Endpoint Cloud.

If you ever need to turn off 2FA, please refer to the Disable Two-Factor Authentication (2FA) page for detailed steps and additional guidance.