Advanced Authentication
Configure two-factor authentication and IP restrictions for enhanced security
Advanced Authentication
Beyond basic password authentication and SSO, Appivo provides additional security controls to protect your tenant. This guide covers two-factor authentication and IP address restrictions.
Two-Factor Authentication
Two-factor authentication (2FA), also known as multi-factor authentication (MFA), adds an extra layer of security by requiring users to provide a one-time password (OTP) in addition to their regular credentials.
How It Works
- User enters their username and password
- User is prompted for a one-time code
- User opens their authenticator app and enters the code
- Access is granted if the code is valid
Supported Authenticator Apps
Users can generate OTPs using any TOTP-compatible authenticator app:
| App | Platforms |
|---|---|
| Google Authenticator | iOS, Android |
| Microsoft Authenticator | iOS, Android |
| Authy | iOS, Android, Desktop |
| 1Password | iOS, Android, Desktop, Browser |
Enabling Two-Factor Authentication
As an administrator, you can configure 2FA at the tenant level:
- Navigate to Tenant Settings > Security
- Find the Two-Factor Authentication section
- Choose an enforcement option:
| Option | Description |
|---|---|
| Disabled | 2FA is not available |
| Optional | Users can choose to enable 2FA for their account |
| Required | All users must configure 2FA to access the tenant |
| Required by Date | 2FA becomes mandatory after a specified date |
Setting an Enforcement Date
If you want to give users time to set up their authenticator apps:
- Select Required by Date
- Choose a date in the future
- Save the configuration
Users will see reminders to set up 2FA until the enforcement date. After that date, they won't be able to log in without completing 2FA setup.
Note: Consider giving users at least 1-2 weeks notice before requiring 2FA.
User Setup Experience
When a user enables 2FA (or when it's required):
- User is shown a QR code
- User scans the QR code with their authenticator app
- User enters the verification code displayed in the app
- 2FA is activated for their account
- Backup codes are generated for account recovery
Backup Codes
When users enable 2FA, they receive a set of backup codes. These codes:
- Can be used if the user loses access to their authenticator app
- Each code can only be used once
- Users should store them securely (not on the same device as the authenticator)
Resetting 2FA for a User
If a user loses access to their authenticator:
- Navigate to Users in the admin panel
- Find and select the user
- Click Reset 2FA
- The user will need to set up 2FA again on next login
IP Address Restrictions
IP restrictions allow you to limit access to Appivo applications from specific network ranges. This is useful for ensuring applications can only be accessed from your corporate network or approved locations.
Use Cases
| Scenario | Configuration |
|---|---|
| Office-only access | Allow only your office IP range |
| VPN required | Allow only your VPN exit IP addresses |
| Regional restrictions | Allow IP ranges for specific geographic regions |
| Partner access | Include partner organization IP ranges |
Configuring IP Restrictions
- Navigate to Tenant Settings > Security
- Find the IP Restrictions section
- Click Add IP Range
- Enter the IP range in CIDR notation
Supported Formats
Both IPv4 and IPv6 address ranges are supported:
| Format | Example | Description |
|---|---|---|
| Single IPv4 | 192.168.1.100 | Single IP address |
| IPv4 CIDR | 192.168.1.0/24 | Range of 256 addresses |
| IPv4 CIDR | 10.0.0.0/8 | Large corporate network |
| Single IPv6 | 2001:db8::1 | Single IPv6 address |
| IPv6 CIDR | 2001:db8::/32 | IPv6 address range |
Multiple Ranges
You can configure multiple IP ranges to accommodate different networks:
- Main office network
- Branch office networks
- VPN exit points
- Remote worker approved locations
Each range is evaluated independently - access is granted if the user's IP matches any configured range.
Testing IP Restrictions
Before enforcing IP restrictions:
- Add your current IP address range first
- Test access from within the allowed range
- Verify that access is blocked from outside the range (using a different network or mobile data)
- Have another administrator available in case you get locked out
Warning: Be careful when configuring IP restrictions. If misconfigured, you could lock yourself out of the admin panel.
Bypass for Administrators
Consider whether administrators should be able to bypass IP restrictions for emergency access. Options include:
- Maintaining a separate admin access range
- Creating a break-glass procedure with a super-admin account
- Using a VPN that terminates at an allowed IP
Combining Security Controls
For maximum security, combine multiple authentication controls:
| Configuration | Security Level | User Experience |
|---|---|---|
| Password only | Basic | Simple |
| Password + 2FA | Strong | Moderate friction |
| SSO only | Strong | Seamless (if already logged into IdP) |
| SSO + IP Restrictions | Very Strong | Seamless within network |
| SSO + 2FA + IP Restrictions | Maximum | Higher friction |
Recommended Configurations
For most organizations:
- Enable SSO with your corporate identity provider
- Require 2FA for administrator accounts
- Consider IP restrictions for sensitive applications
For high-security environments:
- Enable SSO with your corporate identity provider
- Require 2FA for all users
- Enforce IP restrictions to corporate network
- Implement session timeout policies
Troubleshooting
User Can't Complete 2FA Setup
- Verify the user's device time is synchronized (TOTP codes are time-sensitive)
- Have the user try a different authenticator app
- Check that the QR code is being scanned correctly
User Blocked by IP Restriction
- Verify the user's current IP address
- Check if the IP falls within an allowed range
- Consider if the user is behind a proxy or NAT that changes their apparent IP
2FA Codes Not Working
- Ensure the device clock is accurate (within 30 seconds)
- Verify the user is using the correct account in their authenticator app
- Check if backup codes are available
Next Steps
- SSO Setup - Configure single sign-on
- Security Guide - Role-based access control
- Authentication Guide - User management basics