Skip to main content

Multi-Factor Authentication (MFA)

Add an extra layer of security to your CastellanAI account with multi-factor authentication.

99.9% Risk Reduction

MFA significantly reduces account compromise risk, even if your password is compromised.


Why Use MFA?

MetricValue
Risk Reduction99.9% reduction in account compromise
Required ForAdministrator and Security Analyst roles
MethodsMultiple authentication methods supported

Supported MFA Methods

Use a time-based one-time password (TOTP) app for secure, offline authentication codes.

Supported Apps:

AppPlatform
Microsoft AuthenticatoriOS, Android
Google AuthenticatoriOS, Android
AuthyiOS, Android, Desktop
1PasswordAll platforms

Advantages:

  • Works offline
  • No phone number required
  • Fast authentication

Setting Up MFA

Step 1: Navigate to Profile Settings

Go to your profile page and access MFA settings.

Navigation Path: Profile → Security → Multi-Factor Authentication


Managing MFA Devices

View Active Devices

See all MFA devices associated with your account:

Path: Profile → Security → Manage Devices

InformationDescription
Device nameNickname you assigned
TypeAuthenticator, Security Key, SMS
Last usedDate of last authentication
Added dateWhen device was registered

Troubleshooting MFA Issues

"Invalid code" error

Common Causes & Solutions:

CauseSolution
Time driftSync device time automatically
Code expiredWait for next 30-second cycle
Wrong accountVerify correct app entry selected
Copy errorRe-type code manually

MFA Enforcement Policies

CastellanAI enforces MFA requirements based on user roles:

RoleMFA RequiredGrace Period
Administrator✅ Required7 days
Security Analyst✅ Required7 days
Incident ResponderRecommended30 days
ViewerOptionalNot enforced
📝 MFA Setup Checklist
  • Choose primary MFA method (authenticator app recommended)
  • Complete setup and verify code works
  • Save backup codes in secure location
  • Set up secondary MFA method (hardware key recommended)
  • Test account recovery with backup code
  • Document recovery procedures

What's Next?

GuideDescription
User Activity MonitoringTrack user activity and audit logs
Roles & PermissionsRole-based access control management
Access ControlIP and time-based access restrictions