Multifactor authentication

This feature is only available for Devolutions Server, Microsoft Azure SQL, Microsoft SQL Server, and SQLite workspaces.

Multifactor authentication (MFA) identifies users by at least two different components: something that the user knows (often a password) and something that the user possesses (e.g., a validation code sent to a mobile device). If one of the components is missing or supplied incorrectly, the user's identity is not established with sufficient certainty and access to the workspace will remain blocked.

MFA is set at the workspace level, except in Devolutions Server, where it is set on the user. Remote Desktop Manager supports Authenticator (TOTP), Yubikey, and Duo.

Consult Lost the MFA set on the workspace in the the MFA has been lost.

Configure multifactor authentication on a Microsoft Azure SQL or SQL Server workspace

  1. In Remote Desktop Manager, go to the workspace for which you want to configure the MFA.

  2. Go to FileMy account settings and click on Workspace MFA.

  3. In the Multifactor configuration window, click Change.

  4. Select your MFA type in the drop-down list.

  5. Follow one of the links below depending on the choice made in the previous step:

Configure multifactor authentication on an SQLite workspace

  1. In Remote Desktop Manager, go to the workspace for which you want to configure the MFA.

  2. Go to FileWorkspaces and click on the Edit workspace button.

  3. Next to the Multifactor option, click None.

  4. In the Multifactor configuration window, click Change.

  5. Select your MFA type in the drop-down list.

  6. Follow one of the links below depending on the choice made in the previous step:

Configure multifactor authentication on a Devolutions Cloud workspace

  1. In the Devolutions Cloud web UI, head over to AdministrationAuthentication.

  2. Toggle Enforce multi-factor verification on Devolutions Account. Doing so will force you to set up an MFA as well.

Configure multifactor authentication on a Devolutions Server workspace user

As mentionned before, multifactor authentication is set on a per-user basis for Devolutions Server workspaces. Here's how do to so:

  1. Open the Devolutions Server web UI.

  2. Go to AdministrationUsers, and Edit the user you wish to enforce MFA on.

  3. In the Multi-factor tab, select Authenticator (TOTP). Changing the multifactor authentication of an administrator account requires entering its password.

  4. Scan the QR code with your mobile app or use the key and account name to set up your account. Alternatively, you can check the Configure later by the user to leave those steps to the user.

  5. Then, enter the code obtained by scanning the QR code.

  6. Click Update to apply the changes to the user.

Configure multifactor authentication on a Microsoft Azure SQL or SQL Server workspace

  1. In Remote Desktop Manager, go to the workspace for which you want to configure the MFA.

  2. Go to File – My account settings and click on Workspace MFA.

  3. In the Multifactor configuration window, click Change.

  4. Select your MFA type in the drop-down list.

  5. Follow one of the links below depending on the choice made in the previous step:

Configure multifactor authentication on an SQLite workspace

  1. In Remote Desktop Manager, go to the workspace for which you want to configure the MFA.

  2. Go to File – Workspaces and click on the Edit workspace button.

  3. Next to the Multifactor option, click None.

  4. In the Multifactor configuration window, click Change.

  5. Select your MFA type in the drop-down list.

  6. Follow one of the links below depending on the choice made in the previous step:

Configure multifactor authentication on a Devolutions Cloud workspace

  1. In the Devolutions Cloud web UI, head over to AdministrationAuthentication.

  2. Toggle Enforce multi-factor verification on Devolutions Account. Doing so will force you to set up an MFA as well.

Configure multifactor authentication on a Devolutions Server workspace user

As mentionned before, multifactor authentication is set on a per-user basis for Devolutions Server workspaces. Here's how do to so:

  1. Open the Devolutions Server web UI.

  2. Go to AdministrationUsers, and Edit the user you wish to enforce MFA on.

  3. In the Multi-factor tab, select Authenticator (TOTP). Changing the multifactor authentication of an administrator account requires entering its password.

  4. Scan the QR code with your mobile app or use the key and account name to set up your account. Alternatively, you can check the Configure later by the user to leave those steps to the user.

  5. Then, enter the code obtained by scanning the QR code.

  6. Click Update to apply the changes to the user.

See also

Devolutions Forum logo Share your feedback