- Account Management >
- Manage Your Two-Factor Authentication Options
Manage Your Two-Factor Authentication Options¶
On this page
Two-factor authentication provides a second layer of security for your Ops Manager account.
When enabled, Ops Manager requires 2FA to help users control access to their Ops Manager accounts.
To log into Ops Manager, a user must provide their password (“something you know”), as well as a second time-sensitive verification code, delivered during authentication (“something you have”). By requiring both factors, Ops Manager can grant authentication requests with a higher degree of confidence.
Note
If an Organization Owner
enables multi-factor authentication for an
organization, all
organization members must enable multi-factor authentication individually to access the
organization. Organization members who have not enabled MFA are
able to access Ops Manager, but not the organization for which MFA is
required.
After you enter your username and password, you are prompted for a six-digit time-sensitive verification code. This code is sent to a separate device, such as a mobile phone or security token, that you can read and enter into Ops Manager and complete your login.
Note
To enable or disable two-factor authentication for the entire Ops Manager environment, see Manage Two-Factor Authentication for Ops Manager.
Ops Manager provides the following sources for 2FA verification codes:
- Text/Voice
- 2FA App
- 2FA device
- Text Messages (SMS)
When Ops Manager prompts you for a verification code, Ops Manager sends the 6-digit verification code using text (SMS) to the provided phone number.
The cellular carrier’s SMS rates apply.
- Automated Voice Calls (US / Canada only)
When Ops Manager prompts you for a verification code, Ops Manager calls the provided phone number. An automated system repeats the 6-digit verification code a total of three times before hanging up.
The cellular carrier’s Voice Call rates apply.
Note
Ops Manager users who operate within a geographic region with limited cellular service coverage or reliability may encounter delays in receiving the 2FA code via SMS or Voice. Consider using a 2FA app or device instead.
When Ops Manager prompts you for a verification code, you can provide one that is generated in a 2FA app. You must pair the 2FA app with Ops Manager first.
This tutorial uses the Google Authenticator mobile app.
There are other mobile device apps and web browser plug-ins that provide 2FA capabilities. You can use any that support the TOTP.
You can pair only one app with Ops Manager at any one time.
When Ops Manager prompts you for a verification code, you can provide one that is generated in a 2FA PIV device. You must pair the PIV device app with Ops Manager first using an 2FA app. These devices must support TOTP.
This procedure uses a YubiKey security key, specifically those that work with Authenticator Codes. Other 2FA PIV hardware devices that use TOTP should work in a similar fashion.
Informational Reference only
MongoDB does not endorse the aforementioned service, and its reference is intended only as informational. Defer to your organization’s procedures in selecting the appropriate vendor or service for supporting 2FA via smart card or similar device.
Configure Two-Factor Authentication¶
Go to your Ops Manager Account Settings.¶
In Ops Manager, click your username in the top-right corner and select Account.
Enable Two-Factor Authentication.¶
Click Enable 2FA or click pencil icon .
When prompted for verification:
- If you are setting up 2FA, enter your password.
- If you are editing your 2FA settings, enter a 2FA code.
- Click Verify.
Configure Voice/SMS Authentication.¶
- Click Primary Method
- Click Voice/SMS Number.
- In the Enter your phone number box, enter your preferred mobile phone number.
- Select your preferred method of receiving codes:
- Text Message (SMS) or
- Voice Call (US / Canada Only)
- Click Verify.
- Once you receive the verification code, enter that code into the into the Verify your code boxes. Each digit is entered in its own box.
Ops Manager automatically verifies the code and saves your settings.
Go to your Ops Manager Account Settings.¶
In Ops Manager, click your username in the top-right corner and select Account.
Enable Two-Factor Authentication.¶
Click Enable 2FA or click pencil icon .
When prompted for verification:
- If you are setting up 2FA, enter your password.
- If you are editing your 2FA settings, enter a 2FA code.
- Click Verify.
Configure your Ops Manager 2FA settings.¶
- Click Primary Method.
- Click Google Authenticator.
On your mobile device or web browser, install Google Authenticator.¶
Although only Google Authenticator is displayed in the UI, any TOTP mobile app or web browser plug-in may be used.
Note
Wherever you see the phrase Google Authenticator in this procedure, you can substitute the name of your preferred 2FA app.
App | iOS | Android | Windows Phone | Blackberry |
---|---|---|---|---|
Google Authenticator | Link | Link | ||
Duo Mobile | Link | Link | Link | |
Authy | Link | Link | ||
Microsoft Authenticator | Link | Link | Link | |
Gauth | Link |
Add Ops Manager to Google Authenticator.¶
Start Google Authenticator.
Click +.
Choose how to pair the Google Authenticator app with Ops Manager.
If your mobile device or web browser supports scanning barcodes, click Scan a barcode.
Enable the device’s camera, if prompted, and point the device at the Ops Manager page to capture the barcode.
If your mobile device or web browser does not support scanning barcodes, or if you prefer to enter a key, click Enter provided key.
Ops Manager displays the Ops Manager Account with a Key.
In Google Authenticator, click Enter provided key then enter the account and key.
(Duo Mobile, Authy and other apps have similar prompts.)
After the barcode is scanned or account and key are entered, the Google Authenticator app produces a 6-digit code to verify the pairing.
Once you receive the verification code, enter that code into the into the Verify your code boxes. Each digit is entered in its own box.
Ops Manager automatically verifies the code and saves your settings.
See also
- Pairing third-party applications with Duo Mobile
- Pairing third-party applications with Authy
- Pairing third-party applications with Microsoft Authenticator
Download and install the Yubico Authenticator.¶
- From a web browser, download the Yubico Authenticator application.
- Double-click on the installer and follow the prompts.
Insert your Yubikey into a USB port.¶
Go to your Ops Manager Account Settings.¶
In Ops Manager, click your username in the top-right corner and select Account.
Enable Two-Factor Authentication.¶
Click Enable 2FA or click pencil icon .
When prompted for verification:
- If you are setting up 2FA, enter your password.
- If you are editing your 2FA settings, enter a 2FA code.
- Click Verify.
Configure your Ops Manager 2FA settings.¶
- Click Primary Method.
- Click Google Authenticator.
Add Ops Manager to the Yubikey.¶
Start the Yubico Authenticator.
Make sure that your web browser is open to your Ops Manager Two-Factor Authentication modal with the Google Authenticator button selected.
From the File menu in Yubico Authenticator, select Scan QR code….
In the New credential dialog box, confirm the following settings:
Option Accepted Value Keep Default? Issuer The name you want to display in the Yubico Authenticator application for Ops Manager. Your choice Account name Your Ops Manager username. Yes Secret key Token generated from the QR code. Yes Type Method that determines when to generate a new code. Yes Algorithm Encryption algorithm the token uses. Yes Period Duration that each verification code is valid. Yes Digits Number of digits in the verification code. Yes Requires touch Indicates user must be touching the contacts on the Yubikey when verification code is accepted. User choice Click Save credential.
The verification code displays in the Yubico Authenticator under the heading you gave Ops Manager as the Issuer.
Once you receive the verification code, enter that code into the into the Verify your code boxes. Each digit is entered in its own box.
Note
You can copy the code from the Yubico Authenticator application. Click the name you gave as Issuer then select Copy to Clipboard from the Edit menu.
Ops Manager automatically verifies the code and saves your settings.
Generate New Recovery Codes¶
As a backup, you can generate recovery codes to use in place of a sent code when you do not have access to a phone, 2FA app or 2FA device. Each recovery code is single-use, and you should save these codes in a secure place. When you generate new recovery codes, you invalidate previously generated ones.
Go to your Ops Manager Account Settings.¶
In Ops Manager, click your username in the top-right corner and select Account.
Edit your Two-Factor Authentication settings.¶
Click pencil icon to the right of Two Factor Authentication.
When prompted for verification, enter a 2FA code then click Verify.
Click Show Recovery Codes.¶
Each time you expand this box, Ops Manager generates a new set of codes.
Keep the codes in a safe place. Each code can be used in conjunction with your username and password to not only access Ops Manager but to reset your security settings on Ops Manager.
Reset Legacy Two Factor Authentication¶
If you have legacy 2FA enabled and you lose access to your 2FA device, you can reset 2FA for your account.
Important
Log in to Ops Manager with your username and password.
When the 2FA prompt displays:
- Click the Reset your two-factor authentication link.
- Click Ops Manager user? Click here at the bottom of the Reset Two Factor Authentication modal.
Type your Ops Manager username.
Click Reset Two Factor Authentication.
Ops Manager emails a link to the e-mail account associated with the Ops Manager username.
Check your email.
Click the link that Ops Manager sent to start the 2FA reset procedure.
Follow the directions on the 2FA reset page. After completing the reset procedure, Ops Manager allows you to log in to the Ops Manager account without requiring a 2FA code.