Skip to main content

Multi-Factor Authentication (MFA)

Multi-factor authentication (MFA) adds an extra layer of security by requiring users to provide two or more verification factors to access their accounts. Users must verify their identity using one of the supported authentication methods after entering login credentials (email/phone/username + password).

Supported MFA Methods in LoginRadius

  • SMS OTP
  • Time-Based OTP (TOTP) via Authenticator App
  • Email OTP
  • Security Questions
  • Push Notification
  • Passkey
  • Backup Codes
  • Duo Authentication

Refer to the MFA documentation for the configuration steps for these methods.

MFA Workflow Scenarios

When a user logs in with valid credentials but has no authenticators configured, all available MFA options will be presented:

a) Email OTP

  • If only one email is linked, the OTP input is shown.
  • If multiple emails exist, the user selects from a dropdown.
  • Includes Resend Verification Code and Back options.

b) Security Questions

  • If not set, the user is prompted to configure questions first.
  • If set, the user answers them to continue.
  • If forgotten, the "Set Security Questions" button allows reconfiguration.

c) Google Authenticator

  • A QR code is displayed to configure the TOTP-based authenticator.

d) SMS OTP

  • An OTP is sent for verification after verifying or updating the phone number.

Implementing MFA via APIs

Select desired authentication methods via the LoginRadius Console.

Lockout Scenarios During MFA

Repeated failures in verifying the second factor trigger a lockout, based on brute force protection settings:

Lockout TypeBehavior
SuspendTemporarily locks the account. Users must wait and log in again after the suspension period.
CaptchaPrompts reCAPTCHA verification on login retry.
Security QuestionsRequires answering security questions to unlock.
BlockThe account is locked permanently until an administrator manually unblocks it.

Note: Users can fall back on Backup Codes if no unlock method works.

Best Practices

  • Ensure users always have at least one MFA method configured.
  • Encourage users to set up Backup Codes if their primary factor is inaccessible.
  • Monitor lockout events using LoginRadius Events & Logs.
  • Use REST APIs for granular control and automation across MFA operations.