Using Multi-Factor Authentication with Securd

Using Multi-Factor Authentication with Securd

Securd supports multi-factor authentication. You will require the Authy application on your mobile device that will be capable of generating a time-based one-time password (TOTP) authentication code.

Download Authy App First

Google Play

1. Under the Account section, please go to the 2FA.

2. Enter a mobile phone number and press the "Enable" button.

3. On the mobile advice, open the Authy app.

4. Enter your TOTP that is being presented, confirm the token.

Once this is enabled, you will require to open your Authy app to login.  You will use your username and password. The second step in logging in will required you to enter in the TOTP.

Enter the current TOTP and press, Login. 
    • Related Articles

    • Enabling DNSSEC in Securd

      DNSSEC (Domain Name System Security Extensions) is a security protocol that provides authentication for DNS data. It is used to protect the internet's global Domain Name System (DNS) infrastructure from various types of attacks, such as spoofing and ...
    • Threat Hunting with Securd

      A cloud-based DNS firewall, such as Securd, can be an effective tool for threat hunting by security analysts. Here is a step-by-step guide on how a security analyst can use Securd for threat hunting: Set up Securd: The first step in using Securd for ...
    • Forwarding BIND DNS Queries to Securd

      DNS forwarding is a useful technique for distributing the workload of handling DNS queries across multiple servers and improving the efficiency of the overall system. In this article, we will look at how to configure DNS forwarding on Bind in Ubuntu ...
    • Understanding How Multi-Tenant Works

      With Securd, you can create multiple companies. Companies can be used in a variety of ways to segregate Securd by customer, organization or other logical segregation option of your choice. Every Securd "Company" is a separate tenant of Securd and has ...
    • Securd URL Proxy

      Securd URL Proxy analyzes web traffic for high risk URLs. It examines the domain and full URL of request to determine if it is a threat. The targeted proxy performs HTTPS security analysis of good sites that are exploited to deliver cyber attacks. ...