LogoLogo
  • Solution Overview
    • PLC Management and Code Versioning platform
    • Basic terminology
    • Supported automation vendors
  • Project versioning
    • How to upload and manage projects
    • How to use the Windows local client
    • How to view projects incl. changes
  • AI Generated Code Documentation
    • Overview
    • How to generate a documentation
  • Connectivity Service
    • Overview
    • Requirements
    • How to set up a Gateway
    • Configuring Proxy
    • Configuring networks
    • FAQ
  • Browser Based Engineering
    • Working with Browser Based Engineering
    • Up- and download of TIA licenses for Browser Based Engineering
    • Troubleshooting
  • Automated backup
    • Configuring automated PLC backups
  • Automated deployment
    • Directly deploying your projects
    • Deployment Requests (preview)
      • Actions with 2 Factor Authentication (preview)
  • Console administration
    • Creating an account
    • SSO via Azure Active Directory
    • Deleting an account
    • Inviting console users
    • Receiving a console invite
    • Understanding permissions
    • Managing permissions
    • Choosing a subscription plan
    • Viewing bills, downloading invoices, and managing payment methods
  • Examples
    • Quick Start Guide
    • Preparing a Raspberry Pi to be used as a Gateway
  • FAQ
    • Deployment
    • IDEaaS
Powered by GitBook
On this page
  1. Automated deployment
  2. Deployment Requests (preview)

Actions with 2 Factor Authentication (preview)

This feature is currently in preview and requires additional confirmation before performing critical actions.

PreviousDeployment Requests (preview)NextCreating an account

Last updated 10 months ago

This feature requires 2 Factor Authentication (2FA) for critical actions (Start IDEaaS, Approve Deployment Requests and Execute Deployments) and can be enabled for the company, by the company/tenant OWNER role in SDA.

Click on the users Profile on the header -> Click on Manage Company

On the Manage Company Dialog the OWNER can enable or disable the 2 Factor Access, and choose between Email, Authenticator App or both methods.

Once enabled, all users will be requested to enter a confirmation code before starting IDEaaS sessions, Approving deployment requests and Executing approved deployments.

If the user has MFA enabled (Authenticator App) this will be the default method requested, otherwise the email method will be used.

Approving Deployment Request with 2 Factor Authentication

One additional step is added for approving Deployment Requests (click continue to proceed).

By continuing the user enters his MFA code to approve, or if MFA is not configured for the user, he will receive a code on his email, valid for 2 minutes.

If the code is validated the action is executed.

How to enable MFA for the user?

Go to User Profile on the Header -> Click on User Profile

Change the switch MFA disabled to enabled it, and follow the instructions to configure your Authenticator app.

For users with MFA enabled, the code will also be requested on sign in. For Active Directory users the code will be used only for actions within the Console, with no impact on sign in.

Frequently Asked Questions (FAQs)

What happens if I do not want to use a third-party Authenticator App?

You can still use the email method. You will receive a code via email valid for 2 minutes

Manage Company is only available for Company OWNERs
Enabling 2 Factor Access on Manage Company Dialog
Approval Dialog in two steps
Second step of approval, enter the 2 Factor Authentication code to Approve
User Profile menu
Multi-Factor-Authentication configuration