Multi-Factor Authentication MFA / Require 2FA System Configuration

The Enterprise Health system supports Multi-Factor Authentication (MFA) or Two-Factor Authentication (2FA) using one-time passwords (OTP):

  • Via authentication using an external device or app that generates the OTP
  • Via authentication based on an email that generates the OTP

MFA/2FA Via External Device or App of One-Time Password (OTP)

Security Role Permission - Require 2FA

Security Role based authentication via a security role permission. Each individual security role of users can be configured to a specific option in Require 2FA security permission. The Require 2FA security permission has 3 options:

  • No - users can access the system with a username and password only. MFA/2FA would not be utilized.
  • Encourage - users get a screen (after keying in their username and password) to set up MFA/2FA, but allows the user to select ‘set up later’ to bypass the set up process. Users will be prompted each time they log in to set up MFA/2FA until they do so.
  • Force - requires users to set up MFA/2FA after keying in their username and password.

  • WARNING: Some interfaces utilize a user account for their functionality. Typically these interface configured ‘users’ are within the security role of Interface User. An interface configured ‘user’ should never be set to require 2FA nor OTP, for the interface to continue to function properly.

System Setting - Authentication Methods Selections of HOTP or TOTP or Both

If security role users are required to use MFA/2FA of ‘Encourage’ or ‘Force’, the Enterprise Health system supports the Multi-Factor Authentication (MFA) or Two-Factor Authentication (2FA) using one-time passwords (OTP). There are two types of OTP methods:

  • HOTP (HMAC-based One-Time Password): Generates a password that changes each time you request it, based on a counter.
  • TOTP (Time-based One-Time Password): Generates a password that changes automatically after a set period (usually every 30 seconds), based on the current time.

MIE strongly recommends utilizing the TOTP time-based password, however, an HOTP counter-based password is an available option for those users that may have difficulty quickly typing a specific digit number or have a device which does not reliably keep the current time.

The system setting can be set system wide to force users to use only HOTP (value 1), or only TOTP (value 2). However, a third option allows the user choice of both methods (value 3) to select one from. These options provide an extra layer of security when logging in using MFA/2FA. This means users may use an app or device that generates these codes, and users need to enter the one time password (OTP) to advance into the system.

The difference between** HOTP and TOTP** is:

  • HOTP: The code changes only when you request a new one (for example, by pressing a button in your app or device). Each code is used once and then a new one is generated the next time you need it.
  • TOTP: The code changes automatically every set amount of time (usually every 30 seconds), whether you request it or not. You have to use the current code before it expires and a new one appears. MIE recommends this setting.

In short:

  • HOTP = code changes when you ask for it
  • TOTP = code changes on its own, based on an amount of time

Authentication Method Examples

Here are some examples of each MFA/2FA authentication method option for the system setting value.

System Setting Value 3 (allow both HOTP or TOTP) what user sees when logging in:

System setting ‘Use 2FA’ is set to value 3 (offers either HOTP or TOTP for the user to select):

System Setting Value 2 (allow only TOTP) what user sees when logging in:

System setting ‘Use 2FA’ is set to value 2 (TOTP time based):

System Setting Value 1 (allow only HOTP) what user sees when logging in:

System setting ‘Use 2FA’ is set to value 1 (HOTP counter based):

Extra Authentication via Email of One-Time Password (OTP)

Security Role Permission - OTP Required

Security Role based authentication via a security role permission. Each individual security role of users can be configured to Require OTP (via email) security permission. The OTP Required security permission has 2 options:

  • Yes - Requires users to sign in with their username and password but in addition requires them to include a one-time password (OTP) that will be generated by the system and emailed to them instead of using an external device or app to generate the OTP. An email must be on the user’s chart.
  • No - will not require the user to receive an OTP emailed for login requirements

While it is possible to “Encourage” or “Require” using the other Require 2FA security permission, while at the same time setting a security role to “Yes” for this OTP Required security permission - only one OTP will be requested at sign in. The Require 2FA security permission of ‘encourage’ or ‘force’ would instead, have the user’ OTP at their first sign in would be prompted to also provision their 2FA application or device. Doing so would then allow them to skip the generated OTP request and only utilize the OTP from their 2FA device during future sign in attempts.

Emailed OTP

Default email notification of OTP:

Emailed OTP Layout

The system provides for a default OTP notification email. Custom notification emails may be generated utilizing a non-standard layout. module: “OTP”, name: “OTP Notification Email” will have access to @user_id as well as @user_otp when generating an email notification to the end user.

What user sees when logging in:

IP’s Allowed to Bypass 2FA Configuration

The system can be configured to bypass 2FA from specific known IP addresses. It is recommended that customers have reviewed this feature with their Network IT security department and have authorization before proceeding with configuration.

System Setting - Enable Bypass 2FA OTP

The system setting Enable Bypass 2FA OTP is disabled by default. This can be enabled by an MIE Deployment Consultant or a system administrator with specific security permission. When enabled, users whose device is detected as having an IP Address within a configured “In Network” location are able to bypass the prompt for an OTP prior to signing in. However, 2FA device/app users who selected the “Every Login (Maximum Security)” radio button option when they provisioned their device will ignore this setting and still be prompted for their 2FA OTP every time they attempt a sign in, regardless of their IP Address at the time.

If OTP Required security permission (emailed OTP) is yes, and this system setting to Enable Bypass 2FA OTP is enabled, the user is identified as “In Network” and has configured a 2FA device with the “When the system deems appropriate (More Security)” option, the user will be permitted to sign in without having entered an OTP (regardless of the “Require 2FA” level) as the individual selection for “When appropriate” coupled with the relaxing of requirements by the system setting of “allow in network” is given higher priority than the requirements of the general OTP options.

IP Settings

Gather the specific IP’s which 2FA is allowed to bypass. Next, go to IP Settings found within the Control Panel. Again, you must have security permission to Manage IP Settings to access this screen. Verify the IP Address doesn’t already exist to be allowed to Bypass 2FA in the datavis listing.

NOTE: In order to configure IP addresses to be able to Bypass 2FA, you must have security permission to Manage IP Settings as Yes.

Add Acceptable IP Rules

To add an IP address to be able to bypass 2FA, simply click the Add Acceptable IP Rule hyperlink found at the top right of the IP Settings.

Within the Add Acceptable IP Rules, type in the specific IP Address and have the Bypass 2FA checkbox marked. Add to save your work.

Once the IP address(es) have been added to the IP Settings, set the system setting Enable Bypass 2FA OTP to enabled value. This will allow those known configured IP addresses to skip MFA/2FA.

There are other system settings related to the OTP functionality:

  • OTP CSRF Valid Minutes: defaults to 30 minutes and specifies the maximum amount of time that a user may continue to request OTPs before they must re-enter their manual username and password. This setting allows tightening the window of time when replay attacks are available against the user’s account.
  • OTP Length: defaults to 6 and sets the number of characters present in the generated OTP. This setting can allow for a longer OTP, up to 20 characters, to further increase the difficulty of attackers attempting to compromise a user account.
  • OTP Request Delay Seconds: defaults to 30 seconds and specifies the minimum amount of time which must elapse before an additional OTP request may be made against the system. This setting allows rate-limitting a potential attacker in order to further protect a compromised account against unwanted OTP forcing.
  • OTP Valid Seconds: defaults to 15 minutes (900 seconds) and specifies the maximum amount of time during which a generated OTP will be accepted by the system before it expires. User entry of expired OTPs count as a login failure and are counted as such, potentially resulting in locked user accounts. This setting allows shortening the window during which an OTP delivered to an account can be utilized for attacks against the account.
  • Failure Delays: is shared with the standard sign-in system and introduces a set minimum processing duration for executing user credential validation in order to mitigate timing attacks against the system. This duration should be as close to the duration of a successful authentication as possible to minimize the delay experienced by the user while also hiding failure details from potential attackers.
  • Autoreply: is shared with many other functions within the system and specifies the sending ‘from’ email address used for email-based OTP notification messages.

Individual User MFA/2FA Managing by a System Admin via Access Control

Once MFA/2FA is configured for specific security roles, an individual user can be setup, reset, or re-provisioned from their Edit User page within Access Control by a System Administrator with rights. Setup is completed most easily on a device that has 2D barcode scanning capability by following the prompts in Enterprise Health and on your device; however, setup can also be completed with a device that does not support barcode scanning.

Not Enabled - Setup (on Edit User in Access Control)

From within the Access Control screen, search for an individual user and click to Edit the User. Once in the Edit User screen, there is a 2 Step Verification field that will display. This shows if the user is enabled for MFA/2FA or not enabled.

In most cases, the individual user will also need to be present with the system administrator to have their device ready in order to setup their 2FA/MFA.

Click the Setup hyperlink from the Edit User screen.

A pop-up window offering TOTP and/or HOTP (depending on system setting configured) will be displayed. Select the options and click the Create button.

The rest of the steps will mimic the user experience side. Please refer to the other user experience guides:

After clicking Complete Setup, you will receive a pop-up message if 2 Step Verification was successfully completed for the user.

Enabled - Change (on Edit User in Access Control)

From within the Access Control screen, search for an individual user and click to Edit the User. Once in the Edit User screen, there is a 2 Step Verification field that will display. This shows if the user is enabled for MFA/2FA or not enabled.

In most cases, the individual user will also need to be present with the system administrator to have their device ready in order to change their 2FA/MFA.

Click the Change hyperlink from the Edit User screen.

The Change 2 Step Verification pop-up window will display a message asking if you want to disable the user’s MFA/2FA or want to set up MFA/2FA for the user on their new device.

Disable

To disable the user’s 2 step verification, hit the Disable button.

Upon hitting the Disable button, the message displayed will alert you that their 2 Step Verification is now disabled. The user should remove the account on their own authentication app being used on their device.

Click the X on the pop-up window to close out.

The user (once you exit the Edit User screen completely) will revert back to Not Enabled status for 2 Step Verification.

Setup New Device

To change and setup the user’s 2 step verification on a new device, hit the Setup New Device button.

Select the desired selections from the 2 Step Verification pop-up. Selections depend on the system wide system setting configured.

One Time Password (OTP) Emailed

A One-Time Password (OTP) is an easy way to add an additional level of security to a user’s sign-in to the system without requiring them to utilize an external device or application.

Requiring an OTP as part of the sign in experience can be enabled in a user’s security role permissions using the OTP Required permission.

For more information on utilizing an additional level of security to a user’s sign-in to the system without requiring them to have an external device or app, please refer to One-Time Password (OTP) without requiring an external device or application guide.

Additional Resources


Enterprise Health Documentation

Last Updated:

Last Build: Tue, 11 Nov 2025 22:15:30 UTC
WikiGDrive Version: v2.15.27