Multi-Factor Authentication
Description of multi-factor authentication (MFA).
Multi-Factor Authentication (MFA) improves account security in that any login to a user account requires a one-time passcode in addition to the username and password. The one-time passcode (OTP) is required once every seven days for each device, and can be received by email, SMS message, or an app-based token. MFA is strongly recommended for all user accounts, and is required for manager and administrator roles.
Manage MFA for user accounts
By default, MFA is turned on for all user accounts. You can turn off MFA only for employee user accounts, however it is strongly recommended that these accounts use MFA.
-
The administrator must have the MFA required access control point (ACP) turned on as follows:Note: For details, see the Manager - Common Setup ACPs topic.
-
Click Tap
Main Menu
. - Select the profile and click tap Edit.
- Select Manager— Common Setup.
- In Allowed to allow a manager or administrator to override multi-factor authentication (MFA) in People Information for an employee. — In Access Scope, select
- Click Tap Save.
-
Click Tap
Main Menu
-
Turn off MFA for an employee as follows:
-
Click Tap
Main Menu
. - Select the employee.
- In MFA Required. , clear
-
Click Tap
Save
.
-
Click Tap
Main Menu
-
Turn on MFA for an employee as follows:
-
Click Tap
Main Menu
. - Select the employee.
- In MFA Required. , select
-
Click Tap
Save
.
-
Click Tap
Main Menu
Alternatively, you can turn off or turn on MFA for employees by either of the following methods:
- Use the Person Update or Update Multiple Persons API with MFA Required set to False or True.
- Use the Data Import Tool as described in the Use the Data Import Tool topic.
One-time passcode (OTP)
The one-time passcode (OTP) is a string of numbers that is derived from a secret seed password that registers a device. This passcode is valid for a short period of time. The two factors — passcode and time limit — ensure that the OTP is always changing and always secret, except to the service that registers the device.
The OTP is sent as follows:
- By email (default) if the email address of the user account is in People Information.
- By SMS message if the phone number of the account is in People Information, and your organization has the contract and part number for the SMS application.
- By app-based token, if the mobile device is registered by turing on OTP by token..
- Install an authenticator on your device as follows:
- Navigate to the Apple App Store or the Google Play Store.
- Search for, download, and install an authenticator app. The recommended authenticators are ForgeRock Authenticator and Google Authenticator.
- When you log in, do the following:
- You must select Token as the method when you first use MFA.
- Scan the QR code according to the documentation for the authenticator and click tap Next.
- Enter the verification code that the app displays and click tap Submit.
- If the device is not available when you log in:
- Click Tap Use recovery code.
- Record and store the recovery codes or take a screenshot of this screen for backup authentication if the device is missing, damaged, or lost.
- Click Tap Log In.
Account lockout and OTP
( Only if MFA is enabled) If an account is locked because of too many failed attempts to log in with an OTP, do the following:
- Select the employee in the Timecard or schedule. Select .
- In Account Locked select Enabled to manually lock the account.
- Save the changes.
- Select the employee again.
- In Account Locked, select Disabled to manually unlock the account.
- Save the changes.
Log in
When you log in to UKG Pro Workforce Management:
- Enter your User Name and Password, and click tap Log In.
- Select one of the configured methods to receive the one-time passcode (OTP) — Email, SMS message, or app-based soft Token— and click tap Log In. Wait to receive the passcode.
- Enter the One Time Passcode and click tap Log In.