Skip to main content
All CollectionsSecurity & Data ProtectionAccount Security
Two-Factor Authentication: Add an extra layer of verification and account security
Two-Factor Authentication: Add an extra layer of verification and account security

Also known as MFA or 2FA

Daniel Kyne avatar
Written by Daniel Kyne
Updated today

🔒 2FA is available to customers on the Accelerate Tier or higher

Two-step verification adds an extra layer of protection to your OpinionX account. By enabling two-step verification, you can help keep your OpinionX account and your team workspace more secure.

In order to use 2FA, you must:

  1. Verify your email address.

  2. Be on the Accelerate Tier or higher.

Customers that use an identity provider like Google Login or SAML SSO cannot use 2FA.

-- -- --

How to set up 2FA on OpinionX

  1. Click Account on the sidebar menu in your Workspace Homepage.

  2. Go to the Two-Factor Authentication section and click Enable 2FA.

  3. Scan the QR code with your TOPT authenticator app of choice and complete the setup process.

-- -- --

Types of 2FA available on OpinionX

OpinionX's two-factor authentication is designed to work with TOPT authenticators. TOTP stands for Time-based One-Time Password — they create a temporary password that expires after 30 seconds, which is used as a second password after your usual OpinionX login step. Some popular TOPT apps to consider:

  1. Google Authenticator (iOS, Android, Chrome) 🆓

  2. Microsoft Authenticator (iOS, Android) 🆓

  3. Authenticator.cc (Chrome Extension)

  4. Authy (iOS, Android, Desktop) – Supports multi-device sync and cloud backup.

  5. 1Password (iOS, Android, Desktop, Web) – TOTP and password management.

-- -- --

Frequently Asked Questions about 2FA on OpinionX

  1. Can I use a different authentication method instead of TOPT apps?
    Currently the only 2FA method OpinionX supports is TOPT. We do not support 2FA via email or text.

  2. Can I set up 2FA for multiple team members or enforce it for my organization?
    We will be adding this feature in May 2025 for Accelerate Tier customers.

  3. What if I don’t have a smartphone? Can I still use 2FA?
    Yes! If you don’t have a smartphone, you can still use 2FA via desktop authenticator apps or browser extensions like Authy, 1Password, or Bitwarden.

  4. Can I use 2FA on multiple devices?
    Yes, but it depends on the app. Authy and 1Password allow syncing 2FA codes across multiple devices. Google Authenticator and Microsoft Authenticator do not support multi-device sync, so you’d need to manually scan the QR code on each device during setup. Some password managers (eg. Bitwarden, 1Password) can store and sync TOTP codes across devices.

  5. Why is my 2FA code not working? (eg. time sync issues, expired codes)

    If your 2FA code isn’t working, try these fixes:

    • Check the time on your device – If your phone’s time is incorrect or out of sync, TOTP codes won’t work. Ensure automatic time sync is enabled.

    • Make sure you’re using the correct account – If you have multiple 2FA entries, confirm you're entering the right code.

    • Verify the code hasn’t expired – TOTP codes change every 30 seconds, so enter the code before it refreshes.

    • Restart your authenticator app – Some apps may lag or display an outdated code.

    • If none of those work, contact us via the livechat on our website or email [email protected] for assistance.

  6. Is 2FA mandatory for all users?

    By default, 2FA is not mandatory, however customers on the Accelerate Tier or higher can enable mandatory enforcement for all workspace members.

  7. How secure is 2FA, and can it be hacked?
    2FA is highly secure and significantly reduces the risk of account breaches, however it’s not 100% foolproof. Stay on top of your security by training up on and remaining vigilant for:

    • Phishing attacks can trick users into entering 2FA codes on fake websites.

    • SIM-swapping attacks can hijack SMS-based 2FA (this is why TOTP or security keys are safer).

    • Malware on an infected device could steal 2FA codes.

Did this answer your question?