Loading...
 
Skip to main content

ALIF: Two Factor Authentication (2FA)

Overview

Introduced in AIM v5.10, two-factor authentication (2FA) requires two forms of identification for users to log in to the OSD and administrators into the AIM's web interface. To log in, the user will be challenged with entering their password and a time-based 'One Time Password' (OTP), generated with an authenticator application, like Microsoft's and Google Authenticators. A new OTP is generated every 30 seconds. This feature is optional and can be enabled on an individual basis.

 Important
You must use an NTP (Network Time Protocol) Server to use this feature. Since the One Time Password is time-based, the AIM's system clock must be kept in sync. Without this, the clock could drift over time, preventing the OTP from working and stop users logging into the system.

Enabling 2FA

[+] AIM v5.x and below
[-] AIM v6.x
  • Log into the AIM’s web interface.
  • From the Side Menu, choose User Management and then Users.

    UserManagement

  • There are several ways of enabling 2FA for users, except the anon and api_anon user accounts.
    • Option 1: In the 2FA column for each user, you can use the toggle button to enable and disable.
    • Option 2: Select the users you wish to modify using the checkboxes. At the top right of the list, you can choose to Enable 2FA or Disable 2FA. The number in brackets indicates how many of your selected users are eligible for that specific action (e.g., if a user already has 2FA enabled, they will only be counted under the 'Disable' action)
    • Option 3: When you edit a user, in the Security & Access section, you can toggle the 2FA Required. Password Required must also be enabled.

Setting up 2FA on the AIM User Interface

Administrators who have not yet configured 2FA will be prompted to do so immediately after logging into the AIM.

[+] AIM v5.x and below
[-] AIM v6.x

AdminUser2FASetup
On the page will find the following elements:-

  • A QR code that you need to set up the Authenticator application.
  • The Recovery code. This is a one-time unique password that you should copy and store somewhere securely. This code can be used to login should you have problems using the OTP.
  • The date and the time period where the OTP password generated from the Authenticator will be valid, Whilst the authenticator application changes the code every 30 seconds. the AIM will allow login provided that the OTP code is valid between these times. By default this is a 2-minute period, however, this can be changed under System Care -> Global Configuration -> Security Settings and changing the 2FA OTP Window time. This can be set between 1 and 9 minutes.
  • Six single number OTP input boxes to enter the six-digit code that is generated from the Authenticator application.


Setting up the Authenticator

Many applications support time-based One Time Passwords, these include Google Authenticator, Microsoft Authenticator, and Authy to name but a few. They are typically installed on your mobile phone and use the same standard algorithm to generate the codes. The following instructions demonstrate how to configure this in Microsoft Authenticator on Android.

  • Install and open the Microsoft Authenticator
  • Click on the + symbol at the top to add an Account.
  • From the list of options choose Other account
  • Using the Camera, scan the QR Code
  • You should now see an entry in the Authenticator list called AIM Authentication_ followed by the user name.

Completing the Setup

  • Using the Authenticator, now open the AIM Authentication and enter the OTP that it gives you into the AIM.
  • Press Verify
  • Provided that the OTP code is accepted, you will now need to use the OTP every time you login.

 Note
If you decide to skip the 2FA and set it up later, the QR Code used to setup the Authenticator will change, requiring you re-set up the Authenticator application again


Logging into the AIM web interface

The next time you login into the AIM you will just see the following screen without the QR Code etc:

[+] AIM v5.x and below
[-] AIM v6.x

2FAAIM1

If you enter an incorrect OTP, you get an opportunity to enter it again. After five incorrect attempts, you will be blocked for five minutes. If you no longer are able to provide a OTP, you can use the one-time recovery password to login. Entering the Recovery code and clicking Disable 2FA will turn the feature off.

2FAAIM2

Setting up 2FA for a User on the OSD

After 2FA has been enabled, the first time a user raises and logs into the OSD they will need to setup their time-based One Time Password (OTP).

[+] AIM v5.x and below
[-] AIM v6.x

2FAOSD1

Setting up the Authenticator

  • Install and open the Microsoft Authenticator
  • Click on the + symbol at the top to add an Account.
  • From the list of options choose Other account
  • Using the Camera, scan the QR Code
  • You should now see an entry in the Authenticator list called AIM Authentication_ followed by the user name.

Completing the Setup

  • Using the Authenticator, now open the AIM Authentication and enter the OTP that it gives you into the OSD
  • Press Verify
  • Provided that the OTP code is accepted, you will now need to use the OTP every time you login.


Logging into the OSD

 Important
If you enter the OTP incorrectly five times in a row the account is automatically suspended.

The next time you login into the OSD you will just see the following without the QR Code. Re-generating the code will automatically suspend the account, requiring intervention by an administrator to unsuspend it. However, this will enable the user to create a new code in the Authenticator application to login.

[+] AIM v5.x and below
[-] AIM v6.x

2FAOSD2


Page last modified on Wednesday April 15, 2026 17:20:28 GMT-0000