How to Enable Local Multi-Factor Authentication (MFA)

Why Multi-Factor Authentication? Because One Lock Isn’t Enough

We all know the old trope: “Your password must contain at least 18 characters, 3 special symbols, and the name of your first childhood pet—spelled backwards.” But here’s the truth: even the most complicated passwords can be cracked, guessed, or (worst of all) leaked. That’s where Multi-Factor Authentication (MFA) swoops in like a superhero with a second (or even third) shield.

Today, we’re diving into the delightful world of enabling local MFA in N2W. If you’ve ever thought setting this up would require mystical IT powers or a weekend of suffering, prepare to be pleasantly surprised.

Setting Up MFA: As Easy as Pie (without the sticky fingers)

First, let’s lay it out simply: MFA isn’t just “nice to have”—it’s your first real defense against user account compromise. With MFA, you’re saying, “Nice try,” to anyone who thinks they can stroll in with just a password.

Step one: Log in to your N2W console and click on your user account. Then hit “settings” and select, “Multi Factor Authentication”. NOTE: Each user manages their own MFA here—it’s user-centric, so everyone can tailor their own fortress.

Now for the choose-your-own-adventure portion:

  • You can select either a token-generating authenticator app (think Google Authenticator, Authy, or Microsoft Authenticator)
  • Or choose to use good ol’ reliable email-based codes

Token Generators

Let’s start with token generators. Once you choose this route, the system flashes you a QR code that’s more mysterious than the Da Vinci Code. Just whip out your authenticator app, scan the code, and—shazam!—your phone’s generating time-sensitive numbers only you can see.

Enter your code, save your settings, and then, to test your mettle, the system will log you out. As soon as you try to log back in, it’ll ask you for a fresh code. Voila! You’re in, and hackers are out. That’s it. No sacrificing weekends or pulling all-nighters.

Prefer Email? No Problem—Just One More Step (Or Two)

Email-based MFA isn’t just for the “I can never find my phone” crowd. Maybe you’re setting up access for a less tech-savvy teammate, or maybe you just like the comfort of your inbox.

Here’s the trick: N2W’s console uses AWS Simple Email Service (SES) to send those magic codes. That means you’ll need to make sure SES is all set up and your “sender” email is verified.

Quick setup rundown:

  • Go into your general settings.
  • Check that email configuration is using SES, and enter your designated sender email.
  • Click over to the AWS console, head for Simple Email Service, and add/verify your email address.
  • Got your verification email? Click that link! (You know you want to.)
  • Once SES says you’re verified, head back, refresh, and now your email-powered MFA is ready to roll.

Just don’t forget to add that same email address to your own user settings. Finish the loop, save, and next time you sign in, you’ll get your security code in your inbox—no mystic codes required.

Why Bother? Because Security Is Everyone’s Business

Sure, enabling MFA is straightforward, but its impact is huge. By requiring something you know (a password) and something you have (a token or email access), you’re making your accounts about as appealing to hackers as a porcupine in a balloon factory.

So, whether you’re scanning a QR code or checking your email, you’re taking an easy (but crucial) step to protect your critical infrastructure in N2W’s Console.

Go ahead, flex those security muscles. Your boss—and your data—will thank you.

N2W icon in white

Get the monthly TL;DR newsletter