We are happy to announce special offers for miniOrange Atlassian SSO, 2FA, REST API, User Sync and Group Sync Apps.
Two Factor Authentication(2FA) is an extra step added to your log-in process. It enhances your security by one level and protects your Jira account from cyber criminals.
Two factor authentication uses two factors to verify your identity and to confirm that you are who you claim to be. It uses a combination of something you know and something you have. So here the 1st factor of authentication is your usual Jira login with username and password, it is something you know. The 2nd factor will verify something that only you have, like your mobile phone, your email account, a hardware token given to you by your company, etc.
The add-on verifies this 2nd factor. The most commonly used 2FA methods are Mobile Authenticator(TOTP), Hardware Token(Yubikey), OTP over Email, Security Questions, Backup code. So a time sensitive security code is sent to the user using any of these ways so that the user can securely log into Jira.
In this guide we will go through how to get started with 2FA.
Download authenticator app:
Scan the QR code:
Verification code generated on the mobile:
How to Configure Hardware Token(Yubikey)
After you log in using the first factor i.e Jira username and password, you will be asked to configure the hardware token given to you by your company. To configure the hardware token as a 2FA method, follow these steps:
How to Validate Hardware Token(Yubikey)
Once the configuration is completed successfully, you will be asked to verify your identity by validating your configured hardware token during every login attempt.
On successful login, you will be prompted to validate your configured hardware token. Follow these steps to validate your token:
How to Configure Web Authentication
Web Authentication provides stronger authentication by allowing users to make a choice of authenticators like security keys, system PINs or built-in platform biometric authenticators such as fingerprint, iris scan, facial recognition etc. to protect their accounts.
After you log in using the first factor i.e username and password, follow the below steps to configure Web Authentication as a 2FA method.
How to Validate Web Authentication
Once the configuration is completed successfully, you will be asked to verify your identity by validating your registered system authenticator during every login attempt.
Follow the below steps to validate your system authenticator after successfully validating your local credentials i.e username and password:
If you wish to modify or change your registered system authenticator, follow the steps given below :
How to Configure OTP Over SMS
In this method, you need to verify your identity by entering the OTP which you will receive via SMS on your mobile.
After you log in using the first factor i.e username and password, follow the below steps to configure OTP over SMS as a 2FA method.
How to Validate OTP Over SMS
Once your 2FA configuration is completed successfully, whenever you try to log in again, an OTP will be sent to your registered mobile number to verify your identity.
Enter the OTP sent to your configured mobile to get access to your account.
How to configure Duo Push Notification
Duo Push Notification as a 2FA method provides an additional layer of security by allowing users to APPROVE or DENY an authentication request received on their registered device.
After you log in using the first factor i.e username and password, follow the below steps to configure Duo Push Notification as a 2FA method.
How to Validate Duo Push Notification
2FA configuration is a one-time process and once it is completed successfully, whenever you try to log in again, you need to APPROVE the authentication request received on your registered device.