#Multi-Factor Authentication (MFA)
#Overview
Multi-factor authentication adds an extra layer of security to your AiDial portal account. Sign-in, authenticator setup, MFA challenge, and recovery-code entry are handled by AiDial's identity provider, while the portal checks that your account satisfies the required MFA policy before protected pages and actions are available.
#Which Roles Require MFA?
| Role | MFA Requirement |
|---|---|
Client Administrator (client_admin) | Optional |
Partner Administrator (partner_admin) | Required |
AiDial Administrator (aidial_admin) | Required |
AiDial Operator (aidial_operator) | Required |
Client Manager (client_manager) | Optional |
Client Staff (client_staff) | Optional |
Partner User (partner_user) | Optional |
For mandatory-MFA roles, the portal treats the session as compliant only after MFA is enrolled and the current sign-in has satisfied the required challenge. If a mandatory-role customer or partner session is not compliant, the portal sends the user to Settings to complete the security step.
#Supported Authentication Factors
AiDial Portal currently recognises these MFA factors from Zitadel session state:
totp: Time-based One-Time Password from a TOTP-compatible authenticator app.recovery_code: Provider-issued recovery code used during sign-in.
The portal does not render its own authenticator QR code and does not validate TOTP or recovery-code values directly. Those steps happen in Zitadel.
#How to Enrol in MFA
- Sign in to the portal: Use the normal portal sign-in page. If your role requires MFA and the current session is not compliant, the portal redirects you to Settings.
- Open MFA setup: In Settings, use Open MFA setup when it is available. The link opens the trusted provider security page for your account.
- Complete setup in Zitadel: Follow the provider-hosted flow to add a TOTP authenticator app, scan the QR code shown by Zitadel, verify the current code, and save the provider-issued recovery codes.
- Refresh the portal status: Return to the portal and use Refresh security status. This signs in again with a callback to Settings so the portal receives fresh OIDC MFA claims.
- Acknowledge recovery-code storage if prompted: After enrolment, re-enablement, or declared recovery-code regeneration, the portal may ask you to confirm that you stored the current recovery-code set.
#Recovery Codes
Recovery codes are managed by Zitadel, not generated or displayed by AiDial Portal. Use them from the provider sign-in flow if you lose access to your authenticator app.
The portal stores only non-secret lifecycle markers for recovery-code acknowledgements and reminders. It does not store raw recovery codes.
#Important Guidelines
- Store recovery codes securely: Save them in a password manager or print them and keep them in a secure location.
- Acknowledge storage in the portal when prompted: This records that you stored the current provider-issued set; it does not copy the codes into the portal.
- Review or regenerate codes in the provider: If a trusted provider management link is available, use it to review or regenerate recovery codes, then refresh the portal status.
- Respond to recovery-code reminders: If the portal detects a recovery-code sign-in, Settings may remind you to review or regenerate your codes.
- Never send raw recovery codes to support: Support can guide recovery steps, but users and operators must not paste recovery-code values, authenticator seeds, one-time codes, session cookies, or bearer tokens into tickets or chat.
#Recovery & Lockout
#If You Lose Your Authenticator Device
- Use a recovery code in Zitadel: During provider sign-in, use the recovery-code option if it is available for your account.
- Review your recovery options: After signing in with a recovery code, the portal may show a reminder in Settings to review or regenerate recovery codes.
- Set up a new authenticator device: Use the trusted provider management link from Settings when available, then refresh the portal status.
#If You Have Lost Both Your Authenticator and Recovery Codes
If you cannot access your authenticator app and have no remaining recovery codes:
- Contact your organisation's administrator: They may be able to assist with account recovery through the identity provider's administrative tools.
- Contact AiDial support: If your administrator is unable to help, contact
help@aidial.com.aufor further assistance.
The portal cannot bypass MFA on its own, reveal one-time codes, or reset MFA from an unauthenticated browser session. Account recovery is managed through the identity provider and authorised support processes.
#Disabling MFA
- Roles that require MFA (
partner_admin,aidial_admin,aidial_operator) cannot disable MFA while assigned to that role. - Optional-MFA roles can launch trusted provider MFA management from Settings only when the current lifecycle state allows it and a trusted provider management URL is available.
- The portal does not disable the factor directly. It records the launch request and opens the provider management flow.
- After changing MFA in the provider, refresh the portal security status so the current session reflects the new state.