Encourage Multi-Factor Authentication MFA/2FA User Experience

The WebChart system supports Multi-Factor Authentication (MFA) or Two-Factor Authentication (2FA) using one-time passwords (OTP):

  • Via authentication using an external device or app that generates the OTP
  • Via authentication based on an email that generates the OTP

For information on system administrator configuration of MFA/2FA for the system and options, please refer to guide Multi-Factor Authentication MFA/Require 2FA Configuration.

Encourage MFA/2FA Security Permission

This guide is an overview of the ‘Encourage’ permission to Require 2FA security permission. It requires an external device/authentication app by the user.

8d3034efd55f4adb6cc46dcafac2047d

However, a permission to ‘require’ to have users login using Multi-Factor Authentication (MFA) or 2FA is available and an overview of its user experience is in a separate guide. Systems that utilize SSO (single sign-on) will not be affected.

User Experience as ‘Encourage’ security permission users for Require 2FA

The user manually logs in with their username/email and then keys in their unique password.

Cbd926de5557886a5334fce43eec1a6c

The next screen regarding MFA/2FA will display contents based on what the system wide system setting for Use 2FA is configured to.

However, users get a screen (after keying in their username and password) to set up MFA/2FA, but allows the user to select ‘set up later’ to bypass the MFA/2FA set up process. Users will be prompted each time they log in to set up MFA/2FA until they do so.

3b9b0d999ccf5522e448734183e278f8

Setting up MFA/2FA

System Wide Setting Value 3 (allow both HOTP or TOTP) what user sees when logging in:

System setting ‘Use 2FA’ is set to value 3 (offers either HOTP or TOTP for the user to select):

D61d4ff2d87469c31b58301f8c95ded9

The User should click the Create button to advance.

System Wide Setting Value 2 (allow only TOTP) what user sees when logging in:

System setting ‘Use 2FA’ is set to value 2 (TOTP time based):

57d05d3b7428ab161d3ebf52706571ee

SystemWide Setting Value 1 (allow only HOTP) what user sees when logging in:

System setting ‘Use 2FA’ is set to value 1 (HOTP counter based):

A0e155f059e5f5baf070cc58bc3f12c1

Scan Barcode with Authentication Device App

Make sure to have some authenticator app installed on your external device/phone (ex: Google Authenticator, Microsoft Authenticator).

On the WebChart system screen:

  • Select Yes for Does device support scanning a barcode
  • It is recommended to utilize Time Based
  • Click the Create button

E2b555c8cc736fe97708cf322b334a9e

The WebChart system will generate a unique QR code and displays that on the next screen upon clicking Create button.

D7e186bb1bde2f094fc409ff73e8e591

On your external device (ex: smartphone), open the authenticator app you utilize (ex: Google Authenticator, Microsoft Authenticator).

6bb61372f006643a2f0bb0c5fb534dd8

  • Within the authenticator app, there is an icon ability to ‘Scan a QR code'.
  • Point the device camera to the QR code on the WebChart system screen.
  • Your device authenticator app will now display a unique 6-digit OTP (one-time password) for you to use.

Fe8437b07508a101d78b752f190fa468

Go back to WebChart system screen and Enter the OTP from your device. Next, click the Complete Setup button.

5ba46b0e60c66685873a1eebd99c3876

If successful, you will see that your 2 Step Verification setup is now complete. Click the Continue button.

207c281f1a88463ecbf8b9e2a7aeadd7

You will now advance and gain access into the WebChart system.

Cannot Scan Barcode with Authentication Device App

Make sure to have some authenticator app installed on your external device/phone (ex: Google Authenticator, Microsoft Authenticator).

On the WebChart system screen:

  • Select No for Does device support scanning a barcode
  • It is recommended to utilize Time Based
  • Click the Create button

F03dd7915b3db2f2f20c9473b22f2efc

The WebChart system will generate a unique secret Key and displays that on the next screen upon clicking the* Create* button.

26f5db673c182292d18a6e5991157c78

On your external device (ex: smartphone), open the authenticator app you utilize (ex: Google Authenticator, Microsoft Authenticator).

6bb61372f006643a2f0bb0c5fb534dd8

  • Within the authenticator app, there is an ability to ‘add a new account’ typically found within a plus (+) button.
  • Click, within the authenticator app, what kind of account you are adding.
  • Then select the option, within the authenticator app, to manually enter a setup key instead of scanning a QR barcode.
  • Enter the account details by giving it an account name, enter in the Key that the WebChart system generated on the WebChart login screen. Make sure to type it exactly as it appears.
    • Tap the Finish button or ‘add’ or the checkmark within the authenticator app to save the account.
  • Your device authenticator app will now display a unique 6-digit OTP (one-time password) for you to use.

164dabfb2dd11ead2fbcdff8e9fac419

Go back to WebChart system screen and Enter the OTP from your device. Next, click the Complete Setup button.

5ba46b0e60c66685873a1eebd99c3876

If successful, you will see that your 2 Step Verification account setup is now complete. Click the Continue button.

207c281f1a88463ecbf8b9e2a7aeadd7

You will now advance and gain access into the WebChart system.

MFA/2FA Account Setup on an Authenticator

Once the user has setup their MFA/2FA account on an external device authenticator app, the next time they log in to the system, they will not have to create a new MFA/2FA account. They will get a screen (after manually keying in username & password), to key in a new OTP from their authenticator app on their external device.

23226df367e8b2c609c9fd8032dc94fd

The user would open up their authenticator app on their other device, get the random generated 6 digit OTP from their authenticator app, and key it into the WebChart system extra authentication needed screen.

De79e2aa6a3f7a0fe250f0a23c44ae3a

Additional Resources

Was this page helpful?

Let us know how we can improve this documentation.

Published: November 24, 2025