Setting Up Multi-Factor Authentication

Multi-factor authentication (MFA) (sometimes called, two-factor authentication, or 2FA) is a feature that adds an additional layer of security to user accounts. When logging into Bitium, users will be required to enter a randomly-generated code obtained from a physical device (e.g. mobile phone). This code is required to confirm a user’s identity in order to access Bitium.

Enabling Multi-Factor Authentication

To turn on MFA for Bitium:

  1. Go to your Bitium dashboard and select ‘Authentication Settings’.

    Configuring Multi-Factor Authentication

    Authentication Settings

  2. Follow the instructions on the screen.

  3. Download either Authy, Google Authenticator or Microsoft Authenticator to your iPhone, Android, Blackberry or Windows phone. These are recommended apps; you may use any app that supports RFC 6238.

  4. Using the Authenticator app you have installed on your mobile device, scan the code from the Bitium “Manage 2-Step Verification” screen. Alternatively, you can manually enter the text of the code into your Authenticator app.

  5. Once successfully scanned, enter the 6-digit number displayed in your Authenticator app in the provided space under step 3 on the Bitium “Manage 2-Step Verification” screen.

  6. Once MFA is enabled, please print or save the Rescue Codes that are provided and store them in a secure place. These codes will be necessary to regain access to Bitium if your configured device is lost. View your Rescue Codes by clicking on View Codes on the “Manage 2-Step Verification” screen.

That’s it! You have successfully configured your Bitium account for MFA. On your next sign-in, you will be prompted to enter a code from your Authenticator app.

MFA can be configured to be required for every login, or at a set interval. Authentication is confirmed for your individual browser, not your device. The frequency of your required mobile authentication may be set by your company’s administrator in some cases.

Hardware Tokens

Bitium also integrates with various hardware authenticators (RSA-Token, YubiKey, RFC 2289, RFC 4426, OATH HOTP, OATH TOTP, Mobile Phones, etc.) to provide convenient, secure, token-based MFA. Please contact if you are interested in learning more.