Two-Factor Authentication

Last update: Download PDF Edit

1 Introduction

In the Deploy and Operate categories of the Developer Portal, there are several operations that require Two-Factor Authentication.

This document describes the purpose and the fuctionality of two-factor authentication.

2 The Purpose

Two-factor authentication (2FA) validates a second authentication mechanism next to your password. It is required for Mendix Cloud node activities done on a production environment. 2FA ensures that you are authenticated when performing sensitive activities, such as deploying packages and handling production data.

For more information, see Google Authentication.

3 How It Works

Before performing an operation on the production envrionment, you will be required to provide the authentication code.

After entering the authentication code, your browser session is authorized for the next eight hours.

4 Setting Up and Disabling

For details on seting up, see How to Set Up Your Two-Factor Authentication with Google.

If you change your device or phone number, you must contact Mendix Support to disable the authenticator on your Mendix account.

You can re-activate 2FA by triggering any action that requires 2FA on your production environment.

5 Change the Authentication Method

After you have set up your authentication method, you cannot change the authentication method yourself. Only Mendix Support is able to disable the current authentication method. After the authentication method has been disabled, it can be set to a different method.

For example, if you want to change your authentication method from SMS Authentication to Google Authentication, submit a Mendix support request citing Reset Authenticator.

6 Technical Contact

Team members with App Team – Deploy Permissions are authorized to have node permissions. The Technical Contact can grant those members different permissions that can differ per environment. For example, you might want to limit the access of external developers to only the acceptance environment.

For more information, see Security – Node Permissions.