Require all team members to use multi-factor authentication. Enforce security standards across your organization.
Why Enforce MFA?
Security Benefits
| Benefit | Impact |
|---|---|
| Prevent account takeover | 99.9% reduction |
| Compliance requirement | SOC 2, HIPAA, PCI |
| Reduce breach risk | Major security layer |
| Protect sensitive data | Analytics access secured |
Compliance Requirements
MFA often required for:
- SOC 2 Type II
- HIPAA
- PCI DSS
- GDPR (recommended)
- Cyber insurance
MFA Methods Available
Supported Methods
| Method | Security Level | Convenience |
|---|---|---|
| TOTP Authenticator | High | Medium |
| SMS Codes | Medium | High |
| WebAuthn/Security Keys | Very High | High |
| Push Notifications | High | Very High |
Recommended Hierarchy
- WebAuthn (highest security)
- TOTP App (good balance)
- Push Notification (good convenience)
- SMS (last resort)
Enabling MFA Enforcement
Step 1: Access Settings
- Go to Settings → Security
- Click "MFA Policy"
- Configure enforcement
Step 2: Configure Policy
┌─────────────────────────────────────────────────────┐
│ MFA Enforcement Policy │
│ ─────────────────────────────────────────────────── │
│ │
│ Enforcement Level: │
│ ○ Optional (users choose) │
│ ○ Encouraged (prompts but not required) │
│ ● Required (all users must enable) │
│ │
│ Allowed Methods: │
│ ☑ TOTP Authenticator (Google, Authy, etc.) │
│ ☑ WebAuthn / Security Keys │
│ │
│ Grace Period: [14] days │
│ (Time for existing users to enable MFA) │
│ │
│ Applies To: │
│ ● All team members │
│ ○ Specific roles only │
│ ○ Users matching conditions │
│ │
│ [Save Policy] │
└─────────────────────────────────────────────────────┘
Step 3: Set Grace Period
Give users time to comply:
- New policy: 14-30 days recommended
- Urgent security: 1-7 days
- New users: Immediate (no grace)
Step 4: Communicate to Team
Before enforcement:
- Send announcement email
- Provide setup guides
- Offer help sessions
- Monitor compliance
Enforcement Levels
Optional
MFA is available but not required:
- Users can enable if desired
- Good for initial rollout
- Low friction
Encouraged
System prompts but doesn't require:
- Shown setup prompts
- Can skip for now
- Periodic reminders
Required
All users must have MFA:
- Cannot access without MFA
- Grace period for setup
- Locked out after grace
Enforcement Scope
All Team Members
Everyone must comply:
- Admins
- Editors
- Viewers
- Including owner
Role-Based
Enforce for specific roles:
Enforce MFA for:
☑ Owner
☑ Admin
☐ Editor
☐ Viewer
Conditional
Based on conditions:
Require MFA when:
☑ User has Admin role
☑ User accesses billing
☑ User accesses sensitive data
☐ Always
Grace Period
How Grace Period Works
Day 0: Policy enabled
├── Users notified via email
├── Dashboard shows setup prompt
└── All features accessible
Day 1-13: Grace period
├── Daily reminders
├── Setup prompts
└── Features still accessible
Day 14: Enforcement begins
├── Users without MFA locked out
├── Must set up MFA to continue
└── Access blocked until compliant
Grace Period Notifications
Users receive:
- Email on Day 0 (policy announcement)
- Email on Day 7 (reminder)
- Email on Day 12 (urgent)
- Email on Day 14 (enforcement active)
Monitoring Compliance
Compliance Dashboard
View MFA status:
MFA Compliance Status
Compliant: 45/50 (90%)
├── TOTP: 38 users
├── WebAuthn: 5 users
└── SMS: 2 users
Non-Compliant: 5/50 (10%)
├── Grace period: 3 users
└── Locked out: 2 users
Policy: Required
Grace Period: 4 days remaining
Non-Compliant Users
View users without MFA:
| User | Joined | Grace Remaining | Status |
|---|---|---|---|
| john@company.com | Jan 1 | 4 days | Grace |
| sarah@company.com | Jan 10 | 4 days | Grace |
| mike@company.com | Dec 1 | Expired | Locked |
Compliance Reports
Generate reports:
- Current compliance rate
- Compliance over time
- Method distribution
- Non-compliant users
Managing Non-Compliance
During Grace Period
For users who haven't set up MFA:
- Send direct reminder
- Offer assistance
- Explain importance
- Extend grace if needed
After Grace Period
For locked out users:
- Contact user directly
- Provide setup assistance
- Grant temporary extension
- Complete setup together
Granting Extensions
Admin can extend grace:
- Go to Team → Members
- Find user
- Click "Extend MFA Grace"
- Set new deadline
Method Restrictions
Requiring Hardware Keys
For maximum security:
Allowed Methods:
☑ WebAuthn / Security Keys
☐ TOTP Authenticator
Multiple Methods Required
Enterprise PlanRequire backup method:
☑ Require at least 2 MFA methods
Users must set up backup
SSO and MFA
With SSO Enabled
MFA can be:
- Handled by IdP: MFA at SSO provider
- Required by Zenovay: Additional MFA layer
- Combined: IdP MFA + Zenovay MFA
IdP MFA Trust
If your IdP handles MFA:
☑ Trust IdP MFA claims
Users with IdP MFA don't need Zenovay MFA
Emergency Access
Break-Glass Accounts
For emergencies:
- Designated admin accounts
- Exempt from enforcement
- Hardware key required
- Heavily audited
Lost MFA Device
If user loses access:
- Use backup codes
- Contact admin for reset
- Re-enroll new device
- Generate new backup codes
Admin MFA Reset
Admins can reset user MFA:
- Go to Team → Members
- Find user
- Click "Reset MFA"
- User must re-enroll
Audit Trail
MFA Events Logged
| Event | Details |
|---|---|
| MFA enrolled | User, method, time |
| MFA removed | User, method, admin |
| MFA failed | User, method, reason |
| MFA bypassed | User, reason, admin |
| Policy changed | Changes, admin |
Compliance Reports
Track for audits:
- Historical compliance rates
- Method changes
- Policy modifications
- Bypass events
Best Practices
Rollout Strategy
- Announce policy change
- Enable as optional first
- Encourage with reminders
- Require with grace period
- Enforce strictly
Communication
- Explain why MFA matters
- Provide clear instructions
- Offer support resources
- Be available for questions
Support
- Create setup guides
- Host training sessions
- Have IT support ready
- Document procedures
Troubleshooting
User Can't Set Up MFA
Common issues:
- Clock sync problems (TOTP)
- Browser compatibility (WebAuthn)
- Phone number issues (SMS)
Codes Not Working
If TOTP codes fail:
- Check device time sync
- Try adjacent codes
- Re-scan QR code
- Use backup codes
Policy Not Enforcing
If enforcement doesn't work:
- Check policy saved
- Verify grace period
- Check user membership
- Review exceptions