Docs Menu
Docs Home
/
MongoDB Ops Manager
/

Manage Your Two-Factor Authentication Options

On this page

  • Configure Two-Factor Authentication
  • Generate New Recovery Codes
  • Reset Legacy Two Factor Authentication

Two-factor authentication provides a second layer of security for your Ops Manager account.

When enabled, Ops Manager requires 2FA to help users control access to their Ops Manager accounts.

To log into Ops Manager, a user must provide their password ("something you know"), as well as a second time-sensitive verification code, delivered during authentication ("something you have"). By requiring both factors, Ops Manager can grant authentication requests with a higher degree of confidence.

Note

If an Organization Owner enables multi-factor authentication for an organization, all organization members must enable multi-factor authentication individually to access the organization. Organization members who have not enabled MFA are able to access Ops Manager, but not the organization for which MFA is required.

After you enter your username and password, you are prompted for a six-digit time-sensitive verification code. This code is sent to a separate device, such as a mobile phone or security token, that you can read and enter into Ops Manager and complete your login.

Note

To enable or disable two-factor authentication for the entire Ops Manager environment, see Manage Two-Factor Authentication for Ops Manager.

Ops Manager provides the following sources for 2FA verification codes:

Text Messages (SMS)

When Ops Manager prompts you for a verification code, Ops Manager sends the 6-digit verification code using text (SMS) to the provided phone number.

The cellular carrier's SMS rates apply.

Automated Voice Calls (US / Canada only)

When Ops Manager prompts you for a verification code, Ops Manager calls the provided phone number. An automated system repeats the 6-digit verification code a total of three times before hanging up.

The cellular carrier's Voice Call rates apply.

Note

Ops Manager users who operate within a geographic region with limited cellular service coverage or reliability may encounter delays in receiving the 2FA code via SMS or Voice. Consider using a 2FA app or device instead.

When Ops Manager prompts you for a verification code, you can provide one that is generated in a 2FA app. You must pair the 2FA app with Ops Manager first.

This tutorial uses the Google Authenticator mobile app.

There are other mobile device apps and web browser plug-ins that provide 2FA capabilities. You can use any that support the TOTP.

You can pair only one app with Ops Manager at any one time.

When Ops Manager prompts you for a verification code, you can provide one that is generated in a 2FA PIV device. You must pair the PIV device app with Ops Manager first using an 2FA app. These devices must support TOTP.

This procedure uses a YubiKey security key, specifically those that work with Authenticator Codes. Other 2FA PIV hardware devices that use TOTP should work in a similar fashion.

Note

Informational Reference only

MongoDB does not endorse the aforementioned service, and its reference is intended only as informational. Defer to your organization's procedures in selecting the appropriate vendor or service for supporting 2FA via smart card or similar device.

1

In Ops Manager, click your username in the top-right corner and select Account.

2

Click Enable 2FA or click .

When prompted for verification:

  • If you are setting up 2FA, enter your password.

  • If you are editing your 2FA settings, enter a 2FA code.

  • Click Verify.

3
  1. Click Primary Method

  2. Click Voice/SMS Number.

  3. In the Enter your phone number box, enter your preferred mobile phone number.

  4. Select your preferred method of receiving codes:

    • Text Message (SMS) or

    • Voice Call (US / Canada Only)

  5. Click Verify.

  6. Once you receive the verification code, enter that code into the into the Verify your code boxes. Each digit is entered in its own box.

Ops Manager automatically verifies the code and saves your settings.

1

In Ops Manager, click your username in the top-right corner and select Account.

2

Click Enable 2FA or click .

When prompted for verification:

  • If you are setting up 2FA, enter your password.

  • If you are editing your 2FA settings, enter a 2FA code.

  • Click Verify.

3
  1. Click Primary Method.

  2. Click Google Authenticator.

4

Although only Google Authenticator is displayed in the UI, any TOTP mobile app or web browser plug-in may be used.

Note

Wherever you see the phrase Google Authenticator in this procedure, you can substitute the name of your preferred 2FA app.

App
iOS
Android
Windows Phone
Blackberry
Microsoft Authenticator
Gauth
5
  1. Start Google Authenticator.

  2. Click +.

  3. Choose how to pair the Google Authenticator app with Ops Manager.

    • If your mobile device or web browser supports scanning barcodes, click Scan a barcode.

      Enable the device's camera, if prompted, and point the device at the Ops Manager page to capture the barcode.

    • If your mobile device or web browser does not support scanning barcodes, or if you prefer to enter a key, click Enter provided key.

      1. Ops Manager displays the Ops Manager Account with a Key.

      2. In Google Authenticator, click Enter provided key then enter the account and key.

        (Duo Mobile, Authy and other apps have similar prompts.)

      After the barcode is scanned or account and key are entered, the Google Authenticator app produces a 6-digit code to verify the pairing.

  4. Once you receive the verification code, enter that code into the into the Verify your code boxes. Each digit is entered in its own box.

Ops Manager automatically verifies the code and saves your settings.

Tip

See also:

1
  1. From a web browser, download the Yubico Authenticator application.

  2. Double-click on the installer and follow the prompts.

2
3

In Ops Manager, click your username in the top-right corner and select Account.

4

Click Enable 2FA or click .

When prompted for verification:

  • If you are setting up 2FA, enter your password.

  • If you are editing your 2FA settings, enter a 2FA code.

  • Click Verify.

5
  1. Click Primary Method.

  2. Click Google Authenticator.

6
  1. Start the Yubico Authenticator.

  2. Make sure that your web browser is open to your Ops Manager Two-Factor Authentication modal with the Google Authenticator button selected.

  3. From the File menu in Yubico Authenticator, select Scan QR code....

  4. In the New credential dialog box, confirm the following settings:

    Option
    Accepted Value
    Keep Default?
    Issuer
    The name you want to display in the Yubico Authenticator application for Ops Manager.
    Your choice
    Account name
    Your Ops Manager username.
    Yes
    Secret key
    Token generated from the QR code.
    Yes
    Type
    Method that determines when to generate a new code.
    Yes
    Algorithm
    Encryption algorithm the token uses.
    Yes
    Period
    Duration that each verification code is valid.
    Yes
    Digits
    Number of digits in the verification code.
    Yes
    Requires touch
    Indicates user must be touching the contacts on the Yubikey when verification code is accepted.
    User choice
  5. Click Save credential.

    The verification code displays in the Yubico Authenticator under the heading you gave Ops Manager as the Issuer.

  6. Once you receive the verification code, enter that code into the into the Verify your code boxes. Each digit is entered in its own box.

    Note

    You can copy the code from the Yubico Authenticator application. Click the name you gave as Issuer then select Copy to Clipboard from the Edit menu.

Ops Manager automatically verifies the code and saves your settings.

A global team that shares the same Ops Manager account can use Google Authenticator and use the same seed code for all team members. To generate a common seed code that all team members can use, select the Can't scan the barcode? link when Configuring Two-Factor Authentication with Google Authenticator.

As a backup, you can generate recovery codes to use in place of a sent code when you do not have access to a phone, 2FA app or 2FA device. Each recovery code is single-use, and you should save these codes in a secure place. When you generate new recovery codes, you invalidate previously generated ones.

1

In Ops Manager, click your username in the top-right corner and select Account.

2

Click to the right of Two Factor Authentication.

When prompted for verification, enter a 2FA code then click Verify.

3

Each time you expand this box, Ops Manager generates a new set of codes.

Keep the codes in a safe place. Each code can be used in conjunction with your username and password to not only access Ops Manager but to reset your security settings on Ops Manager.

If you have legacy 2FA enabled and you lose access to your 2FA device, you can reset 2FA for your account.

  1. Log in to Ops Manager with your username and password.

  2. When the 2FA prompt displays:

    1. Click the Reset your two-factor authentication link.

    2. Click Ops Manager user? Click here at the bottom of the Reset Two Factor Authentication modal.

  3. Type your Ops Manager username.

  4. Click Reset Two Factor Authentication.

    Ops Manager emails a link to the e-mail account associated with the Ops Manager username.

  5. Check your email.

  6. Click the link that Ops Manager sent to start the 2FA reset procedure.

  7. Follow the directions on the 2FA reset page. After completing the reset procedure, Ops Manager allows you to log in to the Ops Manager account without requiring a 2FA code.

Back

Edit Personal Settings