The two-factor authentication allowlist is a list of users who are permitted to initially configure two-factor authentication when signing in to Web Console. This list contains user accounts without configured two-factor authentication. By default, new user accounts are not included in the two-factor authentication allowlist and must be added to the list by an administrator. If a new account is an integration account used to run OpenAPI scripts, it must be excluded from two-factor authentication.
A user account will be automatically deleted from the two-factor authentication allowlist when it has configured two-factor authentication or is excluded from two-factor authentication.
Manual modifying the two-factor authentication allowlist is available for accounts that have configured two-factor authentication and that have the Modify object ACLs right in the General features: User permissions functional area.
To add a user account to the allow list manually:
The Administration Server properties window opens.
Only users who are not excluded from two-factor authentication and do not have a two-factor authentication secret key can be added to the allow list.
The selected user account is added to the two-factor authentication allowlist. At the next sign-in, the user will be able to generate a secret key.
A user account can be deleted from the two-factor authentication allowlist until two-factor authentication is configured for that account.
To delete user accounts from the two-factor authentication allowlist manually:
The Administration Server properties window opens.
The selected user accounts are deleted from the allow list.

Configuring the two-factor authentication allowlist
If, during an active session on Administration Server, your two-factor authentication secret key is deleted by another user or you reset the key yourself but do not create a new one, the ability to modify the allow list is blocked.
User accounts can also be automatically added and deleted from the two-factor authentication allowlist.
When resetting a two-factor authentication secret key for other accounts, their accounts are automatically added to the two-factor authentication allowlist so that they can generate a new secret key.
When upgrading Administration Server from version 16 or earlier to version 16.1 or later, as well as when you create a data backup on Administration Server 16 or earlier and restore it on Administration Server 16.1 or later, user accounts will be automatically added to the two-factor authentication allow list if all the following conditions are met:
Failure to meet even one condition will result in the user not being added to the two-factor authentication allowlist.
After an upgrade or restore, we recommend ensuring that the allow list contains only the user accounts that must have access to Administration Server. Review the allow list and remove any other accounts from it. Add integration accounts used to run scripts through OpenAPI to the exclusion list to prevent script failures.
Accounts of the users will lose access to Administration Server after an upgrade or restore if all the following conditions are met:
These accounts can be manually added to the two-factor authentication allowlist, if needed.
Page top