Couchdrop Knowledge Base
Couchdrop HomepageDevelopersLogin
  • Welcome
  • Features
    • SFTP Server
      • Storage
      • Users
      • How to connect
      • Enabling FTPs
      • Host key authentication
    • Transfer Automations
      • Creating an Automation
      • Supported Actions
      • Variables
      • Troubleshooting
    • Shared Links
    • Upload Links
    • Inbound Mailboxes
    • Inbound Webhooks
    • File Actions
    • Inbound AS2 Stations
  • Administration
    • Users and Groups
      • User Roles
      • Creating Users
      • The Root Directory
      • Passwords and RSA Keys
      • Features Access
      • Firewalls and ACLs
    • Storage Connections
      • SharePoint
      • Azure Files
      • Amazon S3
      • Google Workspace
      • Google Drive
      • Box
      • Dropbox
      • Egnyte
      • Outbound AS2
      • External SFTP Server
      • Windows / Mac File Server
        • Server Requirements
        • Proxy Configuration
        • Non-GUI Environments
        • Running the Couchdrop Agent as a Service
        • Logging and Debugging
      • Others
        • OneDrive
        • Azure Blob
    • Folder Permissions
    • Alerting and Notifications
    • Custom Domains
    • SSO and Single Sign-on
      • SAML SSO
      • SCIM - Azure
      • SCIM - Okta
    • Security
      • Password Policies
      • Account Lockout
      • Account expiry
      • Two Factor Authentication
    • Other
      • Static IPs
      • Malware Scanning
  • Walkthroughs
    • Using SFTP Clients
      • OpenSSH SFTP
      • How to use SFTP with Cyberduck
      • How to use SFTP with FileZilla
      • Using SFTP with Golang
      • Using Python with SFTP
      • Using SFTP with Java
      • Using SFTP with Bash
      • Using SCP
    • SFTP To SharePoint
    • SFTP to Azure Files
    • Automated file transfers to SharePoint
    • Email Inboxes with Couchdrop
    • Delegating Domain-Wide Authority in Google Workspace
  • Other
    • FAQs
    • Trust/Security Center
    • Login to Couchdrop
    • API Documentation
Powered by GitBook

Couchdrop

  • Homepage
  • Register
  • Login

Platform

  • Cloud SFTP Server
  • Cloud FTP Server
  • Automated Transfers
  • Mailboxes and Inboxes

Copyright Couchdrop Limited 2025

On this page
  • Overview
  • Enabling Two Factor Authentication
  • Forcing the use of MFA/Two Factor Authentication
  • Debugging issues

Was this helpful?

Export as PDF
  1. Administration
  2. Security

Two Factor Authentication

Learn about configuring MFA/2fa in Couchdrop

PreviousAccount expiryNextOther

Last updated 1 year ago

Was this helpful?

Overview

Couchdrop supports MFA/2FA natively through an integration with Authy (by Twilio). All users can configure 2fa for the Couchdrop Web App and when they first login to Couchdrop.

Authy supports SMS based 2FA and QR code based authenticator apps like the Microsoft Authenticator, 1password and the Google Authenticator. Setup is quick and easy and users can self manage.

Enabling 2FA does not restrict SFTP and FTP access. 2FA is only supported for the web app.

Enabling Two Factor Authentication

Users can self manage 2fa by logging into the Couchdrop Web App and clicking on their user profile.

Forcing the use of MFA/Two Factor Authentication

Couchdrop now supports 2fa enforcement via a new security option. When enabled, users who have not configured 2fa will be required to configure it the next time they login.

How to Enable

To enable 2fa enforcement;

  1. Login to Couchdrop as the owner

  2. Click Administration --> Security

  3. Under Password Policies, toggle the checkbox for Enforced MFA

Debugging issues

Couchdrop administrators with permissions to manage users can disable 2fa for users in their tenant. Disabling 2fa for a user will allow the user login to Couchdrop without 2fa and retry configuration.

Administrators cannot modify the global security settings or disable 2fa on the account owner. Contact support for help with issues accessing the owner account.