Two-Factor Authentication
Two-factor authentication (2FA) adds an extra layer of security to your GitScrum account. When enabled, you'll need both your password and a verification code from your authenticator app to sign in.
Why Enable 2FA
Account security matters. 2FA protects you against:
| Threat | Protection |
|---|---|
| Password breaches | Stolen password alone cannot access account |
| Phishing attacks | Fake login pages cannot capture your 2FA code |
| Credential stuffing | Reused passwords from other sites are ineffective |
| Session hijacking | Physical access to device required |
Even if someone obtains your password, they cannot access your account without the time-based code from your authenticator app.
Prerequisites
Before enabling 2FA, ensure you have:
- Authenticator app installed on your mobile device:
- Google Authenticator (Android, iOS)
- Authy (Android, iOS, Desktop)
- 1Password (all platforms)
- Microsoft Authenticator (Android, iOS)
- Any TOTP-compatible app
- Backup method ready to store recovery codes:
- Password manager
- Secure document
- Printed copy in safe location
Enabling 2FA
Step 1: Open 2FA Settings
- Navigate to your Profile page
- Click the 2FA button in the header (shows as "Enable 2FA" if not active)
- Modal opens with setup instructions
Step 2: Scan QR Code
- Open your authenticator app
- Add account (usually + button)
- Scan the QR code displayed in GitScrum
- Account added to your authenticator
If you cannot scan the QR code:
- Click "Can't scan?" to reveal manual setup key
- Enter the key manually in your authenticator app
Step 3: Verify Setup
- Enter the 6-digit code from your authenticator
- Code changes every 30 seconds - use current code
- Submit to verify
If verification fails:
- Ensure device time is correct (automatic time sync recommended)
- Wait for next code if current code is expiring
- Try rescanning QR code
Step 4: Save Recovery Codes
After successful verification:
- Recovery codes display (10 single-use codes)
- Copy codes using the Copy button
- Store securely - password manager, secure document, or printed
- Confirm you've saved codes
- 2FA is now active
Recovery Codes:
ABC12-DEF34 GHI56-JKL78
MNO90-PQR12 STU34-VWX56
YZA78-BCD90 EFG12-HIJ34
KLM56-NOP78 QRS90-TUV12
WXY34-ZAB56 CDE78-FGH90Important: Each recovery code works only once. Store them securely.
Signing In with 2FA
Once 2FA is enabled, the login process changes:
Normal Sign-In
- Enter email and password as usual
- Click Sign In
- 2FA prompt appears
- Open authenticator app
- Enter current 6-digit code
- Access granted
Using Recovery Code
If you cannot access your authenticator:
- Enter email and password
- Click "Use recovery code"
- Enter one of your saved recovery codes
- Access granted (that code is now invalidated)
Remember: Each recovery code works only once. Generate new codes if you've used several.
Managing 2FA
Viewing Current Status
Access 2FA settings from Profile:
- Green indicator: 2FA is enabled and active
- Message: "Your account is protected with two-factor authentication"
Viewing Recovery Codes
To see your current recovery codes:
- Click 2FA management button
- Select "View Recovery Codes"
- Enter current 6-digit code to verify identity
- Codes display - copy or note them
Regenerating Recovery Codes
If you've used recovery codes or suspect they're compromised:
- Click 2FA management button
- Select "Regenerate Codes"
- Enter current 6-digit code to verify
- New codes generated - old codes invalidated
- Save new codes immediately
Warning: Regenerating codes invalidates ALL previous codes. Ensure you save the new set.
Disabling 2FA
To remove 2FA from your account:
- Click 2FA management button
- Select "Disable 2FA"
- Warning displays about reduced security
- Enter current 6-digit code to confirm
- 2FA removed from account
Note: Disabling 2FA returns your account to password-only authentication. Consider the security implications before proceeding.
Recovery Scenarios
Lost Authenticator Access
If you lose your phone or cannot access your authenticator:
Option 1: Use Recovery Code
- Select "Use recovery code" at login
- Enter any unused recovery code
- Sign in and immediately set up new authenticator
Option 2: Contact Support If you have no recovery codes:
- Create support ticket from logged-out state
- Provide account verification information
- Support will assist with account recovery
Device Change
Moving authenticator to a new device:
Option 1: Multi-device apps (Authy)
- Authy syncs across devices automatically
- Install on new device and sign in to Authy account
Option 2: Manual migration
- Before factory reset or losing old device:
- Sign in to GitScrum
- Disable 2FA
- Set up new device with authenticator app
- Re-enable 2FA (scan with new device)
- Save new recovery codes
Time Sync Issues
If codes constantly fail:
| Issue | Solution |
|---|---|
| Device time wrong | Enable automatic time setting |
| Manual time offset | Sync time with network |
| App desync | Use "Time Sync" in authenticator app settings |
Most authenticator apps have a time sync option in settings. Google Authenticator: Settings → Time correction for codes → Sync now.
Security Best Practices
Recovery Code Storage
Do:
- Store in password manager
- Keep encrypted backup
- Print and store in secure location
- Use secure notes app
Don't:
- Store in plain text files
- Email to yourself
- Take screenshots
- Share with others
Authenticator App Selection
Consider apps that support:
- Encrypted backups
- Multi-device sync
- Biometric protection
- Export/import functionality
Recommended:
- Authy - Cloud sync, multi-device
- 1Password - Integrated with password manager
- Google Authenticator - Simple, no account required
Account Protection
Complete security checklist:
- ✓ Strong, unique password
- ✓ 2FA enabled
- ✓ Recovery codes stored securely
- ✓ Email notifications for sign-ins enabled
- ✓ Regular password updates
Frequently Asked Questions
What if I enter the wrong code?
You have multiple attempts before temporary lockout. Wait a moment and try the current code (codes change every 30 seconds).
Can I use SMS-based 2FA?
GitScrum uses TOTP (Time-based One-Time Password) via authenticator apps only. SMS is not supported due to security vulnerabilities.
Do I need 2FA for API access?
API tokens are separate from 2FA. Once you generate an API token, it works without 2FA verification. Protect API tokens as you would passwords.
Can workspace admins see my 2FA status?
Admins can see whether 2FA is enabled for workspace members but cannot access your codes, recovery codes, or disable your 2FA.
What happens to 2FA if I'm removed from workspace?
2FA is account-level, not workspace-level. It remains active regardless of workspace membership changes.
Troubleshooting
Code Not Working
- Check time: Device clock must be accurate
- Wait for new code: Don't use expiring codes
- Verify account: Ensure scanning correct QR
- Try recovery code: Use backup if needed
QR Code Won't Scan
- Increase brightness: Ensure screen is visible
- Clean camera: Remove obstructions
- Use manual entry: Click "Can't scan?" option
- Try different app: Some apps have better scanning
Locked Out
- Use recovery code if available
- Contact support if no recovery codes
- Verify identity through support process
- Regain access after verification
Related Pages
- Profile - Main profile settings
- Password Change - Update password
- Support - Contact support for account recovery