We are happy to announce that Thinfinity Remote Desktop now supports 2FA natively in all its editions.
Thinfinity now counts with a built-in HTOP/TOTP server that enables you the advantage to add an extra layer of security to your projects using free and paid 3rd party Identity platforms.
Supported platforms:
-
- Google Authenticator
- DUO Mobile
- Microsoft Authenticator
- Okta Verify
Now you can enable an authentication experience to your environment that is accepted by all the most popular Cybersecurity frameworks.
To configure the One-Time passcode on Thinfinity Remote Desktop, you will have to add the authentication method on the tab “Authentication”, go to the tab “2FA”, and add the option “TOTP.”
If you want to make the Second Factor Authentication compatible with Google Authenticator, check the “Google Authenticator Compatible” checkbox.
You can also specify which authentication method you will use on the tab “Methods”:
You can also specify which authentication methods will use 2FA, using the “Enabled first-step authentication methods” :
Click on ‘Apply’ after you finish configuring all available options.
Next time the user authenticates on the Thinfinity Login page, he will be prompted to scan a QR code for matching his user to a Second-step Code Generate App:
After matching the user with the Second-step Code Generate App, enter the verification code and click on ‘Continue’:
The next time the user authenticates, the QR code will be replaced by the following image:
If the user lost access to its Second-step Code Generate App and needs to be reset, this can be done from the Server Manager.
Click on the ‘Reset 2FA key for user’ , search for the username, and click ‘OK’:
If the user needs help remembering his username, it can be verified by using the ‘I don’t have access to my authentication device’ button.
If you have any questions regarding this blog entry, you can leave a comment below or send us an email at [email protected]
Cheers!
3 Comments
Once you have your QR code you would also have the option to use the code to burn a programmable hardware token. You could either use an NFC programmable TOTP oath token (such as the SafeID/Diamond token), or you could use one of the FIDO keys that can also generate TOTP or HOTP 6 digit codes (in both cases the buring process will scan the QR code and transfer the seed data in the QR code to the hardware token/fido key).
Hi Jeff!
Thank you for contacting us. I allready send your inquiry to the support team to help you set the right configuration for your case. If you require further tech assistance you can also, contact our support team by using this link: https://www.cybelesoft.com/support/.
Have a great day!
Will this work with Authy?